<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Kuicms Php EE — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/kuicms-php-ee/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 16:19:24 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/kuicms-php-ee/feed.xml" rel="self" type="application/rss+xml"/><item><title>Kuicms Php EE 2.0 Persistent Cross-Site Scripting Vulnerability (CVE-2020-37222)</title><link>https://feed.craftedsignal.io/briefs/2026-05-kuicms-xss/</link><pubDate>Wed, 13 May 2026 16:19:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-kuicms-xss/</guid><description>Kuicms Php EE 2.0 is vulnerable to persistent cross-site scripting (CVE-2020-37222), allowing unauthenticated attackers to inject malicious scripts via the bbs reply endpoint, leading to arbitrary script execution in users' browsers.</description><content:encoded><![CDATA[<p>Kuicms Php EE 2.0 is susceptible to a persistent cross-site scripting (XSS) vulnerability. This flaw allows unauthenticated attackers to inject malicious JavaScript code into the application&rsquo;s database, which is then executed in the browsers of users who interact with the affected content. The vulnerability resides within the bbs reply functionality, specifically through the <code>/web/?c=bbs&amp;a=reply</code> endpoint. An attacker can craft a POST request containing malicious HTML and JavaScript payloads within the <code>content</code> parameter. The vulnerability was reported on May 13, 2026, and poses a risk to organizations using the vulnerable Kuicms version, potentially leading to account compromise, data theft, and website defacement.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the <code>/web/?c=bbs&amp;a=reply</code> endpoint.</li>
<li>The attacker crafts a POST request to <code>/web/?c=bbs&amp;a=reply</code>.</li>
<li>The POST request includes a <code>content</code> parameter containing malicious HTML and JavaScript code.</li>
<li>The server-side application fails to properly sanitize the input provided in the <code>content</code> parameter.</li>
<li>The malicious payload is stored in the application&rsquo;s database.</li>
<li>A user views the bbs reply containing the malicious payload.</li>
<li>The malicious JavaScript code is executed within the user&rsquo;s browser, potentially stealing cookies or redirecting the user to a malicious website.</li>
<li>The attacker gains control of the user&rsquo;s session or injects further malicious content into the website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to inject malicious scripts into the Kuicms Php EE 2.0 application. This can lead to a variety of impacts, including account compromise, data theft, website defacement, and further propagation of malicious content. Given the CVSS v3.1 score of 7.2, this vulnerability poses a significant risk to organizations using the affected software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates provided by Kuicms to address CVE-2020-37222.</li>
<li>Implement robust input validation and sanitization mechanisms to prevent XSS attacks, focusing on the <code>content</code> parameter of the <code>/web/?c=bbs&amp;a=reply</code> endpoint.</li>
<li>Deploy the provided Sigma rule to detect potential exploitation attempts targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/web/?c=bbs&amp;a=reply</code> containing HTML or JavaScript payloads.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>xss</category><category>cve-2020-37222</category><category>kuicms</category></item></channel></rss>