<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-45011 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-45011/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 18:30:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-45011/feed.xml" rel="self" type="application/rss+xml"/><item><title>ApostropheCMS Stored XSS via Image Widget Link (CVE-2026-45011)</title><link>https://feed.craftedsignal.io/briefs/2026-05-apostrophe-xss/</link><pubDate>Thu, 14 May 2026 18:30:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-apostrophe-xss/</guid><description>A stored cross-site scripting vulnerability (CVE-2026-45011) was identified in ApostropheCMS image widget functionality, where a user with the Editor role can configure an image widget link to use a javascript: URL payload, which will execute arbitrary JavaScript in the victim’s browser when clicked.</description><content:encoded><![CDATA[<p>A stored cross-site scripting (XSS) vulnerability exists within the image widget functionality of ApostropheCMS version 4.29.0. An attacker with Editor privileges can inject malicious JavaScript code by configuring an image widget&rsquo;s link field with a <code>javascript:</code> URL. This vulnerability allows the attacker to execute arbitrary JavaScript code in the browsers of other users who interact with the compromised image link, including administrators and public visitors. The vulnerability is identified as CVE-2026-45011.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker logs into ApostropheCMS with Editor privileges.</li>
<li>The attacker navigates to the home page and enables edit mode.</li>
<li>The attacker adds an Image widget to the main content area.</li>
<li>The attacker selects an existing image from the media library.</li>
<li>The attacker opens the image widget settings.</li>
<li>In the &ldquo;Link to&rdquo; field, the attacker selects the &ldquo;URL&rdquo; option.</li>
<li>In the URL field, the attacker enters a malicious <code>javascript:</code> payload (e.g., <code>javascript:alert(document.domain)</code>).</li>
<li>The attacker saves the widget and updates the page, publishing the malicious content.</li>
<li>A victim (administrator or guest) visits the published page and clicks on the linked image.</li>
<li>The JavaScript payload executes in the victim&rsquo;s browser, potentially allowing the attacker to perform actions on their behalf.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker with Editor privileges to store a malicious JavaScript payload in a published page within ApostropheCMS. When other users, including administrators or public visitors, click on the affected image link, the injected JavaScript executes in their browsers. This can lead to account compromise, access to sensitive data, modification of content, phishing attacks, and overall compromise of visitors who interact with the malicious image link.</p>
<h2 id="recommendation">Recommendation</h2>
<p>Prioritize the following actions to mitigate this XSS vulnerability:</p>
<ul>
<li>Implement the vendor&rsquo;s recommended URL validation and sanitization for widget link fields to reject dangerous schemes like <code>javascript:</code> and <code>data:</code>.</li>
<li>Deploy the Sigma rule <code>Detect ApostropheCMS XSS via Javascript URL</code> to identify potential exploitation attempts.</li>
<li>Consider implementing a strict Content Security Policy (CSP) to limit the impact of potential XSS vulnerabilities.</li>
<li>Upgrade ApostropheCMS to a version that addresses CVE-2026-45011.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xss</category><category>apostrophecms</category><category>cve-2026-45011</category><category>javascript</category></item></channel></rss>