Submit #597122: Automad Automad flat-file CMS 2.0.0-alpha.37 Stored Cross Site Scriptinginfo

TitleAutomad Automad flat-file CMS 2.0.0-alpha.37 Stored Cross Site Scripting
DescriptionA Stored Cross-Site Scripting (XSS) vulnerability was discovered in Automad flat-file CMS, version 2.0.0-alpha.37. The "Brand" field under the general settings section fails to sanitize user input properly. An attacker can inject malicious JavaScript code which is stored and later executed in the context of the application when the public page is accessed. Affected Component: "Brand" field in General Data and Files HTML Element: <textarea id="am-field__brand" name="data[brand]">...</textarea> Vulnerable Endpoint: /dashboard/shared?section=settings Test Payload: <script>alert('PoC VulDB Automad CMS')</script> Steps to Reproduce: 1 - Go to the admin panel: /dashboard/page 2 - Navigate to “General Data and Files” 3 - Inject the payload in the Brand field 4 - Click Publish 5 - Visit: /demo/{page-id}/ The payload is executed, confirming the stored XSS
Source⚠️ https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README5.md
User
 RaulPACXXX (UID 84502)
Submission06/14/2025 11:35 PM (1 month ago)
Moderation06/15/2025 03:29 PM (16 hours later)
StatusDuplicate
VulDB Entry248684 [automad up to 1.10.9 Setting post.php sitename cross site scripting]
Points0

Do you know our Splunk app?

Download it now for free!