<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Basercms — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/basercms/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 31 Mar 2026 01:18:26 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/basercms/feed.xml" rel="self" type="application/rss+xml"/><item><title>baserCMS DOM-Based Cross-Site Scripting Vulnerability (CVE-2026-32734)</title><link>https://feed.craftedsignal.io/briefs/2026-04-basercms-xss/</link><pubDate>Tue, 31 Mar 2026 01:18:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-basercms-xss/</guid><description>baserCMS versions prior to 5.2.3 are vulnerable to DOM-based Cross-Site Scripting (XSS) due to improper neutralization of input during web page generation, potentially allowing a remote attacker to execute arbitrary JavaScript in a user's browser.</description><content:encoded>&lt;p>baserCMS, a website development framework, is susceptible to DOM-based cross-site scripting (XSS) attacks in versions prior to 5.2.3. This vulnerability, identified as CVE-2026-32734, arises from the improper neutralization of input during the creation of tags. An attacker can exploit this by injecting malicious JavaScript code into the DOM, which is then executed in the victim&amp;rsquo;s browser when they interact with the crafted web page. Successful exploitation can lead to session hijacking…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>vulnerability</category><category>basercms</category></item><item><title>baserCMS OS Command Injection Vulnerability (CVE-2026-30877)</title><link>https://feed.craftedsignal.io/briefs/2026-03-basercms-cmd-injection/</link><pubDate>Tue, 31 Mar 2026 01:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-basercms-cmd-injection/</guid><description>baserCMS prior to version 5.2.3 contains an OS command injection vulnerability in the update functionality, allowing authenticated administrators to execute arbitrary OS commands on the server.</description><content:encoded>&lt;p>baserCMS is a website development framework. Prior to version 5.2.3, a critical OS command injection vulnerability exists within the update functionality. This flaw allows an attacker, authenticated as an administrator, to inject and execute arbitrary operating system commands on the server hosting baserCMS. The commands are executed with the privileges of the user account running the baserCMS application, potentially leading to complete system compromise. This vulnerability was reported on…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>basercms</category><category>command-injection</category><category>webserver</category></item><item><title>baserCMS Pre-Auth Arbitrary Code Execution via Zip Upload (CVE-2025-32957)</title><link>https://feed.craftedsignal.io/briefs/2026-03-basercms-rce/</link><pubDate>Tue, 31 Mar 2026 01:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-basercms-rce/</guid><description>baserCMS versions prior to 5.2.3 are vulnerable to arbitrary code execution via a crafted zip file upload through the restore function, leading to unauthenticated remote command execution on the webserver.</description><content:encoded><![CDATA[<p>baserCMS, a website development framework, contains an arbitrary code execution vulnerability in versions prior to 5.2.3. The vulnerability, identified as CVE-2025-32957, lies within the application&rsquo;s restore function. This function allows users, including potentially unauthenticated users depending on configuration, to upload a .zip file. The uploaded archive is automatically extracted by the application. A PHP file within the extracted archive is then included using <code>require_once</code> without…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>basercms</category><category>rce</category><category>cve-2025-32957</category><category>webserver</category></item></channel></rss>