PluXml CMS is vulnerable to Stored XSS in Static Pages editing functionality. Attacker with editing privileges can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting edited page.
The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only versions 5.8.21 and 5.9.0-rc7 were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
References
| Link | Resource |
|---|---|
| https://cert.pl/posts/2026/03/CVE-2026-24350 | Broken Link |
| https://pluxml.org/ | Product |
Configurations
Configuration 1 (hide)
|
History
27 Feb 2026, 18:34
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cert.pl/posts/2026/03/CVE-2026-24350 - Broken Link | |
| References | () https://pluxml.org/ - Product | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
| CPE | cpe:2.3:a:pluxml:pluxml:5.8.21:*:*:*:*:*:*:* cpe:2.3:a:pluxml:pluxml:5.8.9:rc7:*:*:*:*:*:* |
|
| First Time |
Pluxml pluxml
Pluxml |
27 Feb 2026, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-27 12:16
Updated : 2026-02-27 18:34
NVD link : CVE-2026-24351
Mitre link : CVE-2026-24351
CVE.ORG link : CVE-2026-24351
JSON object : View
Products Affected
pluxml
- pluxml
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
