<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Connect-Cms — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/connect-cms/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 24 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/connect-cms/feed.xml" rel="self" type="application/rss+xml"/><item><title>Connect-CMS Improper Authorization Vulnerability (CVE-2026-32299)</title><link>https://feed.craftedsignal.io/briefs/2026-03-connect-cms-auth-bypass/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-connect-cms-auth-bypass/</guid><description>Connect-CMS versions 1.x up to 1.41.0 and 2.x up to 2.41.0 are vulnerable to improper authorization in the page content retrieval feature, potentially allowing retrieval of non-public information, addressed in versions 1.41.1 and 2.41.1.</description><content:encoded>&lt;p>Connect-CMS, a content management system, is susceptible to an improper authorization vulnerability (CVE-2026-32299) in versions 1.x up to 1.41.0 and 2.x up to 2.41.0. This flaw allows unauthenticated attackers to potentially retrieve non-public information through the page content retrieval feature. The vulnerability stems from a lack of proper access control checks during content retrieval. Patches are available in versions 1.41.1 and 2.41.1, released by the vendor to address this critical…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32299</category><category>connect-cms</category><category>authorization-bypass</category></item><item><title>Connect-CMS Cabinet Plugin DOM-based XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-connect-cms-xss/</link><pubDate>Mon, 23 Mar 2026 20:35:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-connect-cms-xss/</guid><description>A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the Cabinet Plugin list view of Connect-CMS, affecting versions 1.35.0 to 1.41.0 and 2.35.0 to 2.41.0, which can lead to arbitrary script execution in the victim's browser.</description><content:encoded><![CDATA[<p>A DOM-based Cross-Site Scripting (XSS) vulnerability has been identified in the Cabinet Plugin of Connect-CMS. This vulnerability affects versions 1.35.0 through 1.41.0 of the 1.x series and versions 2.35.0 through 2.41.0 of the 2.x series. Discovered by Sho Odagiri of GMO Cybersecurity by Ierae, Inc., the flaw resides in the Cabinet Plugin&rsquo;s list view, stemming from the rendering of saved names. Exploitation requires an attacker to authenticate and access the affected functionality. Successful exploitation allows arbitrary script execution within the victim&rsquo;s browser, potentially leading to unauthorized actions, such as session hijacking, or information theft. Organizations using the Connect-CMS Cabinet Plugin are urged to update to versions 1.41.1 or 2.41.1 to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Connect-CMS application with valid credentials.</li>
<li>Attacker navigates to the Cabinet Plugin list view.</li>
<li>Attacker crafts a malicious payload containing JavaScript code.</li>
<li>Attacker saves a new cabinet or modifies an existing cabinet&rsquo;s name, injecting the malicious payload into the name field.</li>
<li>The application saves the cabinet name with the injected XSS payload.</li>
<li>When a victim user views the Cabinet Plugin list view, the malicious payload is rendered in their browser without proper sanitization.</li>
<li>The victim&rsquo;s browser executes the injected JavaScript code.</li>
<li>The attacker gains the ability to perform actions on behalf of the victim, such as stealing cookies or redirecting to a malicious website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XSS vulnerability can allow an attacker to execute arbitrary JavaScript code in the victim&rsquo;s browser. This could lead to session hijacking, where the attacker gains control of the victim&rsquo;s account. Sensitive information, such as authentication tokens or personal data, could be stolen. The attacker could also redirect the victim to a phishing site or deface the Connect-CMS installation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Connect-CMS to version 1.41.1 or 2.41.1 to patch the XSS vulnerability (CVE-2026-32277).</li>
<li>Implement a Web Application Firewall (WAF) rule to detect and block common XSS payloads in requests to the Cabinet Plugin list view.</li>
<li>Enable strict Content Security Policy (CSP) headers to prevent the execution of inline JavaScript and mitigate the impact of potential XSS attacks.</li>
<li>Implement input validation and output encoding on the Cabinet Plugin&rsquo;s name field to prevent the injection of malicious code.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xss</category><category>connect-cms</category><category>cabinet-plugin</category></item></channel></rss>