ApostropheCMS Stored XSS via Image Widget Link (CVE-2026-45011)
A stored cross-site scripting vulnerability (CVE-2026-45011) was identified in ApostropheCMS image widget functionality, where a user with the Editor role can configure an image widget link to use a javascript: URL payload, which will execute arbitrary JavaScript in the victim’s browser when clicked.
A stored cross-site scripting (XSS) vulnerability exists within the image widget functionality of ApostropheCMS version 4.29.0. An attacker with Editor privileges can inject malicious JavaScript code by configuring an image widget’s link field with a javascript: URL. This vulnerability allows the attacker to execute arbitrary JavaScript code in the browsers of other users who interact with the compromised image link, including administrators and public visitors. The vulnerability is identified as CVE-2026-45011.
Attack Chain
- An attacker logs into ApostropheCMS with Editor privileges.
- The attacker navigates to the home page and enables edit mode.
- The attacker adds an Image widget to the main content area.
- The attacker selects an existing image from the media library.
- The attacker opens the image widget settings.
- In the “Link to” field, the attacker selects the “URL” option.
- In the URL field, the attacker enters a malicious
javascript:payload (e.g.,javascript:alert(document.domain)). - The attacker saves the widget and updates the page, publishing the malicious content.
- A victim (administrator or guest) visits the published page and clicks on the linked image.
- The JavaScript payload executes in the victim’s browser, potentially allowing the attacker to perform actions on their behalf.
Impact
Successful exploitation allows an attacker with Editor privileges to store a malicious JavaScript payload in a published page within ApostropheCMS. When other users, including administrators or public visitors, click on the affected image link, the injected JavaScript executes in their browsers. This can lead to account compromise, access to sensitive data, modification of content, phishing attacks, and overall compromise of visitors who interact with the malicious image link.
Recommendation
Prioritize the following actions to mitigate this XSS vulnerability:
- Implement the vendor’s recommended URL validation and sanitization for widget link fields to reject dangerous schemes like
javascript:anddata:. - Deploy the Sigma rule
Detect ApostropheCMS XSS via Javascript URLto identify potential exploitation attempts. - Consider implementing a strict Content Security Policy (CSP) to limit the impact of potential XSS vulnerabilities.
- Upgrade ApostropheCMS to a version that addresses CVE-2026-45011.
Detection coverage 2
Detect ApostropheCMS XSS via Javascript URL
highDetects XSS attempts in ApostropheCMS by identifying javascript: URLs used in image widget links (CVE-2026-45011)
Detect Script Tag Injection in ApostropheCMS Widget Configuration
highDetects attempts to inject script tags into ApostropheCMS widget configurations, potentially leading to XSS (CVE-2026-45011).
Detection queries are available on the platform. Get full rules →