Kuicms Php EE 2.0 Persistent Cross-Site Scripting Vulnerability (CVE-2020-37222)
Kuicms Php EE 2.0 is vulnerable to persistent cross-site scripting (CVE-2020-37222), allowing unauthenticated attackers to inject malicious scripts via the bbs reply endpoint, leading to arbitrary script execution in users' browsers.
Kuicms Php EE 2.0 is susceptible to a persistent cross-site scripting (XSS) vulnerability. This flaw allows unauthenticated attackers to inject malicious JavaScript code into the application’s database, which is then executed in the browsers of users who interact with the affected content. The vulnerability resides within the bbs reply functionality, specifically through the /web/?c=bbs&a=reply endpoint. An attacker can craft a POST request containing malicious HTML and JavaScript payloads within the content parameter. The vulnerability was reported on May 13, 2026, and poses a risk to organizations using the vulnerable Kuicms version, potentially leading to account compromise, data theft, and website defacement.
Attack Chain
- An unauthenticated attacker identifies the
/web/?c=bbs&a=replyendpoint. - The attacker crafts a POST request to
/web/?c=bbs&a=reply. - The POST request includes a
contentparameter containing malicious HTML and JavaScript code. - The server-side application fails to properly sanitize the input provided in the
contentparameter. - The malicious payload is stored in the application’s database.
- A user views the bbs reply containing the malicious payload.
- The malicious JavaScript code is executed within the user’s browser, potentially stealing cookies or redirecting the user to a malicious website.
- The attacker gains control of the user’s session or injects further malicious content into the website.
Impact
Successful exploitation of this vulnerability allows an unauthenticated attacker to inject malicious scripts into the Kuicms Php EE 2.0 application. This can lead to a variety of impacts, including account compromise, data theft, website defacement, and further propagation of malicious content. Given the CVSS v3.1 score of 7.2, this vulnerability poses a significant risk to organizations using the affected software.
Recommendation
- Apply any available patches or updates provided by Kuicms to address CVE-2020-37222.
- Implement robust input validation and sanitization mechanisms to prevent XSS attacks, focusing on the
contentparameter of the/web/?c=bbs&a=replyendpoint. - Deploy the provided Sigma rule to detect potential exploitation attempts targeting the vulnerable endpoint.
- Monitor web server logs for suspicious POST requests to
/web/?c=bbs&a=replycontaining HTML or JavaScript payloads.
Detection coverage 2
Detect CVE-2020-37222 Exploitation Attempt - Kuicms Php EE BBS Reply XSS
mediumDetects attempts to exploit CVE-2020-37222 by injecting malicious scripts into the Kuicms Php EE bbs reply endpoint.
Detect CVE-2020-37222 Exploitation - Kuicms Php EE BBS Reply XSS with Obfuscation
mediumDetects attempts to exploit CVE-2020-37222 using obfuscated or encoded JavaScript payloads within the Kuicms Php EE bbs reply endpoint.
Detection queries are available on the platform. Get full rules →