CVE-2026-2200

2.4 LOW

📋 TL;DR

This vulnerability allows remote attackers to inject malicious scripts via the /admin/admin/save API endpoint in heyewei JFinalCMS 5.0.0. The cross-site scripting (XSS) attack can be executed remotely, potentially compromising admin sessions or user data. Organizations using JFinalCMS 5.0.0 are affected.

💻 Affected Systems

Products:
  • heyewei JFinalCMS
Versions: 5.0.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific API endpoint /admin/admin/save. Requires the admin interface to be accessible.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal admin credentials, hijack admin sessions, deface websites, or redirect users to malicious sites, potentially leading to complete system compromise.

🟠

Likely Case

Attackers inject malicious scripts to steal session cookies or credentials from admin users, enabling unauthorized access to the CMS admin panel.

🟢

If Mitigated

With proper input validation and output encoding, the attack would fail to execute malicious scripts, limiting impact to failed exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available on GitHub. Attack requires access to the admin endpoint but doesn't require authentication bypass.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Implement input validation and output encoding for the /admin/admin/save endpoint.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize user input before processing.

Implement input validation in the save function to strip or encode script tags and special characters.

Output Encoding

all

Apply proper output encoding when displaying user-controlled data.

Use HTML entity encoding (e.g., convert < to &lt;, > to &gt;) for all user inputs in responses.

🧯 If You Can't Patch

  • Restrict access to the /admin/admin/save endpoint using network ACLs or WAF rules.
  • Implement Content Security Policy (CSP) headers to mitigate XSS impact.

🔍 How to Verify

Check if Vulnerable:

Test the /admin/admin/save endpoint with XSS payloads like <script>alert('XSS')</script> and check if script executes.

Check Version:

Check JFinalCMS version in configuration files or admin panel.

Verify Fix Applied:

Retest with XSS payloads after implementing fixes; scripts should not execute and should be properly encoded.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /admin/admin/save with script tags or encoded payloads.
  • Admin session anomalies or unexpected login attempts.

Network Indicators:

  • HTTP requests containing script tags or JavaScript code targeting the vulnerable endpoint.

SIEM Query:

source="web_logs" AND uri="/admin/admin/save" AND (content CONTAINS "<script>" OR content CONTAINS "javascript:")

🔗 References

📤 Share & Export