Vulnerability Description
A vulnerability was detected in MaxSite CMS up to 109.3. This affects an unknown part of the component Redirect Plugin. The manipulation of the argument f_all/f_all404 results in cross site scripting. The attack can be launched remotely. The exploit is now public and may be used. Upgrading to version 109.4 is able to mitigate this issue. The patch is identified as 8a3946bd0a54bfb72a4d57179fcd253f2c550cd7. You should upgrade the affected component. The vendor was informed early about this issue. They classify it as a "Self-XSS". They deployed a countermeasure: "Nevertheless, we consider this a violation of secure coding standards. The lack of filtering via `htmlspecialchars()` has already been fixed in the latest patch to prevent incorrect data display."
CVSS Score
LOW
Related Weaknesses (CWE)
References
- https://github.com/maxsite/cms/
- https://github.com/maxsite/cms/commit/8a3946bd0a54bfb72a4d57179fcd253f2c550cd7
- https://github.com/maxsite/cms/releases/tag/v109
- https://github.com/wnaspy/CVE/blob/main/Report-%20Stored%20XSS-in-redirect-plugi
- https://vuldb.com/submit/796737
- https://vuldb.com/vuln/359593
- https://vuldb.com/vuln/359593/cti
FAQ
What is CVE-2026-7012?
CVE-2026-7012 is a vulnerability with a CVSS score of 2.4 (LOW). A vulnerability was detected in MaxSite CMS up to 109.3. This affects an unknown part of the component Redirect Plugin. The manipulation of the argument f_all/f_all404 results in cross site scripting....
How severe is CVE-2026-7012?
CVE-2026-7012 has been rated LOW with a CVSS base score of 2.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-7012?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.