← Back to CVEs
CVE-2026-7429
MEDIUM4.6
Description
SSCMS v7.4.0 contains a reflected cross-site scripting vulnerability in the STL processing endpoint that allows attackers to execute arbitrary JavaScript by crafting malicious STL template payloads that are decrypted and returned without proper sanitization. Attackers can exploit improper output encoding in the /api/stl/actions/dynamic endpoint to inject executable JavaScript into JSON responses, leading to session hijacking, phishing attacks, and unauthorized actions performed on behalf of users.
CVE Details
CVSS v3.1 Score4.6
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionREQUIRED
Published4/30/2026
Last Modified5/1/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-79
References
https://github.com/siteserver/cms(disclosure@vulncheck.com)
https://github.com/siteserver/cms/issues/3892(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/sscms-reflected-cross-site-scripting-via-stl-processing(disclosure@vulncheck.com)
https://github.com/siteserver/cms/issues/3892(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.