CVE-2023-53927

PHPJabbers Simple CMS 5.0 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts through section name parameters. Attackers can create sections with embedded JavaScript payloads that will execute when administrators view the sections, potentially enabling client-side code execution.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:phpjabbers:simple_cms:5.0:*:*:*:*:*:*:*

History

27 Dec 2025, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 5.4
References () https://www.vulncheck.com/advisories/phpjabbers-simple-cms-stored-cross-site-scripting-via-section-creation - Third Party Advisory, Exploit () https://www.vulncheck.com/advisories/phpjabbers-simple-cms-stored-cross-site-scripting-via-section-creation - Exploit, Third Party Advisory

24 Dec 2025, 18:02

Type Values Removed Values Added
CPE cpe:2.3:a:phpjabbers:simple_cms:5.0:*:*:*:*:*:*:*
First Time Phpjabbers
Phpjabbers simple Cms
References () https://www.exploit-db.com/exploits/51415 - () https://www.exploit-db.com/exploits/51415 - Exploit, Third Party Advisory, VDB Entry
References () https://www.phpjabbers.com/ - () https://www.phpjabbers.com/ - Product
References () https://www.vulncheck.com/advisories/phpjabbers-simple-cms-stored-cross-site-scripting-via-section-creation - () https://www.vulncheck.com/advisories/phpjabbers-simple-cms-stored-cross-site-scripting-via-section-creation - Third Party Advisory, Exploit

18 Dec 2025, 15:15

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/51415 - () https://www.exploit-db.com/exploits/51415 -

17 Dec 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-17 23:15

Updated : 2025-12-27 17:15


NVD link : CVE-2023-53927

Mitre link : CVE-2023-53927

CVE.ORG link : CVE-2023-53927


JSON object : View

Products Affected

phpjabbers

  • simple_cms
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')