FKIE_CVE-2026-1953
Vulnerability from fkie_nvd - Published: 2026-02-05 07:16 - Updated: 2026-04-15 00:35
Severity ?
Summary
Nukegraphic CMS v3.1.2 contains a stored cross-site scripting (XSS) vulnerability in the user profile edit functionality at /ngc-cms/user-edit-profile.php. The application fails to properly sanitize user input in the name field before storing it in the database and rendering it across multiple CMS pages. An authenticated attacker with low privileges can inject malicious JavaScript payloads through the profile edit request, which are then executed site-wide whenever the affected user's name is displayed. This allows the attacker to execute arbitrary JavaScript in the context of other users' sessions, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of victims.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nukegraphic CMS v3.1.2 contains a stored cross-site scripting (XSS) vulnerability in the user profile edit functionality at /ngc-cms/user-edit-profile.php. The application fails to properly sanitize user input in the name field before storing it in the database and rendering it across multiple CMS pages. An authenticated attacker with low privileges can inject malicious JavaScript payloads through the profile edit request, which are then executed site-wide whenever the affected user\u0027s name is displayed. This allows the attacker to execute arbitrary JavaScript in the context of other users\u0027 sessions, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of victims."
},
{
"lang": "es",
"value": "Nukegraphic CMS v3.1.2 contiene una vulnerabilidad de cross-site scripting (XSS) almacenado en la funcionalidad de edici\u00f3n de perfil de usuario en /ngc-cms/user-edit-profile.PHP. La aplicaci\u00f3n no sanitiza correctamente la entrada del usuario en el campo de nombre antes de almacenarla en la base de datos y renderizarla en m\u00faltiples p\u00e1ginas del CMS. Un atacante autenticado con bajos privilegios puede inyectar cargas \u00fatiles de JavaScript maliciosas a trav\u00e9s de la solicitud de edici\u00f3n de perfil, las cuales son luego ejecutadas en todo el sitio cada vez que se muestra el nombre del usuario afectado. Esto permite al atacante ejecutar JavaScript arbitrario en el contexto de las sesiones de otros usuarios, lo que podr\u00eda llevar al secuestro de sesi\u00f3n, robo de credenciales o acciones no autorizadas realizadas en nombre de las v\u00edctimas."
}
],
"id": "CVE-2026-1953",
"lastModified": "2026-04-15T00:35:42.020",
"metrics": {
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "NONE",
"userInteraction": "ACTIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary"
}
]
},
"published": "2026-02-05T07:16:17.910",
"references": [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"url": "https://github.com/carlosbudiman/CVE-2026-1953-Disclosure"
}
],
"sourceIdentifier": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…