{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/connect-cms/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["cve-2026-32299","connect-cms","authorization-bypass"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eConnect-CMS, a content management system, is susceptible to an improper authorization vulnerability (CVE-2026-32299) in versions 1.x up to 1.41.0 and 2.x up to 2.41.0. This flaw allows unauthenticated attackers to potentially retrieve non-public information through the page content retrieval feature. The vulnerability stems from a lack of proper access control checks during content retrieval. Patches are available in versions 1.41.1 and 2.41.1, released by the vendor to address this critical…\u003c/p\u003e\n","date_modified":"2026-03-24T12:00:00Z","date_published":"2026-03-24T12:00:00Z","id":"/briefs/2026-03-connect-cms-auth-bypass/","summary":"Connect-CMS versions 1.x up to 1.41.0 and 2.x up to 2.41.0 are vulnerable to improper authorization in the page content retrieval feature, potentially allowing retrieval of non-public information, addressed in versions 1.41.1 and 2.41.1.","title":"Connect-CMS Improper Authorization Vulnerability (CVE-2026-32299)","url":"https://feed.craftedsignal.io/briefs/2026-03-connect-cms-auth-bypass/"},{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["xss","connect-cms","cabinet-plugin"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eA DOM-based Cross-Site Scripting (XSS) vulnerability has been identified in the Cabinet Plugin of Connect-CMS. This vulnerability affects versions 1.35.0 through 1.41.0 of the 1.x series and versions 2.35.0 through 2.41.0 of the 2.x series. Discovered by Sho Odagiri of GMO Cybersecurity by Ierae, Inc., the flaw resides in the Cabinet Plugin\u0026rsquo;s list view, stemming from the rendering of saved names. Exploitation requires an attacker to authenticate and access the affected functionality. Successful exploitation allows arbitrary script execution within the victim\u0026rsquo;s browser, potentially leading to unauthorized actions, such as session hijacking, or information theft. Organizations using the Connect-CMS Cabinet Plugin are urged to update to versions 1.41.1 or 2.41.1 to mitigate this risk.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eAttacker authenticates to the Connect-CMS application with valid credentials.\u003c/li\u003e\n\u003cli\u003eAttacker navigates to the Cabinet Plugin list view.\u003c/li\u003e\n\u003cli\u003eAttacker crafts a malicious payload containing JavaScript code.\u003c/li\u003e\n\u003cli\u003eAttacker saves a new cabinet or modifies an existing cabinet\u0026rsquo;s name, injecting the malicious payload into the name field.\u003c/li\u003e\n\u003cli\u003eThe application saves the cabinet name with the injected XSS payload.\u003c/li\u003e\n\u003cli\u003eWhen a victim user views the Cabinet Plugin list view, the malicious payload is rendered in their browser without proper sanitization.\u003c/li\u003e\n\u003cli\u003eThe victim\u0026rsquo;s browser executes the injected JavaScript code.\u003c/li\u003e\n\u003cli\u003eThe attacker gains the ability to perform actions on behalf of the victim, such as stealing cookies or redirecting to a malicious website.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of this XSS vulnerability can allow an attacker to execute arbitrary JavaScript code in the victim\u0026rsquo;s browser. This could lead to session hijacking, where the attacker gains control of the victim\u0026rsquo;s account. Sensitive information, such as authentication tokens or personal data, could be stolen. The attacker could also redirect the victim to a phishing site or deface the Connect-CMS installation.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eUpgrade Connect-CMS to version 1.41.1 or 2.41.1 to patch the XSS vulnerability (CVE-2026-32277).\u003c/li\u003e\n\u003cli\u003eImplement a Web Application Firewall (WAF) rule to detect and block common XSS payloads in requests to the Cabinet Plugin list view.\u003c/li\u003e\n\u003cli\u003eEnable strict Content Security Policy (CSP) headers to prevent the execution of inline JavaScript and mitigate the impact of potential XSS attacks.\u003c/li\u003e\n\u003cli\u003eImplement input validation and output encoding on the Cabinet Plugin\u0026rsquo;s name field to prevent the injection of malicious code.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-03-23T20:35:48Z","date_published":"2026-03-23T20:35:48Z","id":"/briefs/2024-01-03-connect-cms-xss/","summary":"A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the Cabinet Plugin list view of Connect-CMS, affecting versions 1.35.0 to 1.41.0 and 2.35.0 to 2.41.0, which can lead to arbitrary script execution in the victim's browser.","title":"Connect-CMS Cabinet Plugin DOM-based XSS Vulnerability","url":"https://feed.craftedsignal.io/briefs/2024-01-03-connect-cms-xss/"}],"language":"en","title":"CraftedSignal Threat Feed — Connect-Cms","version":"https://jsonfeed.org/version/1.1"}