CVE-2020-36932

SeaCMS 11.1 contains a stored cross-site scripting vulnerability in the checkuser parameter of the admin settings page. Attackers can inject malicious JavaScript payloads that will execute in users' browsers when the page is loaded.
References
Link Resource
https://www.exploit-db.com/exploits/49251 Exploit Third Party Advisory VDB Entry
https://www.seacms.net/ Product
https://www.vulncheck.com/advisories/seacms-checkuser-stored-xss Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:seacms:seacms:11.1:*:*:*:*:*:*:*

History

28 Jan 2026, 17:52

Type Values Removed Values Added
CPE cpe:2.3:a:seacms:seacms:11.1:*:*:*:*:*:*:*
First Time Seacms
Seacms seacms
References () https://www.exploit-db.com/exploits/49251 - () https://www.exploit-db.com/exploits/49251 - Exploit, Third Party Advisory, VDB Entry
References () https://www.seacms.net/ - () https://www.seacms.net/ - Product
References () https://www.vulncheck.com/advisories/seacms-checkuser-stored-xss - () https://www.vulncheck.com/advisories/seacms-checkuser-stored-xss - Third Party Advisory

25 Jan 2026, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-25 13:15

Updated : 2026-01-28 17:52


NVD link : CVE-2020-36932

Mitre link : CVE-2020-36932

CVE.ORG link : CVE-2020-36932


JSON object : View

Products Affected

seacms

  • seacms
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')