SeaCMS 11.1 contains a stored cross-site scripting vulnerability in the checkuser parameter of the admin settings page. Attackers can inject malicious JavaScript payloads that will execute in users' browsers when the page is loaded.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/49251 | Exploit Third Party Advisory VDB Entry |
| https://www.seacms.net/ | Product |
| https://www.vulncheck.com/advisories/seacms-checkuser-stored-xss | Third Party Advisory |
Configurations
History
28 Jan 2026, 17:52
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:seacms:seacms:11.1:*:*:*:*:*:*:* | |
| First Time |
Seacms
Seacms seacms |
|
| References | () https://www.exploit-db.com/exploits/49251 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.seacms.net/ - Product | |
| References | () https://www.vulncheck.com/advisories/seacms-checkuser-stored-xss - Third Party Advisory |
25 Jan 2026, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-25 13:15
Updated : 2026-01-28 17:52
NVD link : CVE-2020-36932
Mitre link : CVE-2020-36932
CVE.ORG link : CVE-2020-36932
JSON object : View
Products Affected
seacms
- seacms
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
