CVE-2026-7429 PUBLISHED

SSCMS v7.4.0 Reflected Cross-Site Scripting via STL Processing

Assigner: VulnCheck
Reserved: 29.04.2026 Published: 30.04.2026 Updated: 30.04.2026

SSCMS v7.4.0 contains a reflected cross-site scripting vulnerability in the STL processing endpoint that allows attackers to execute arbitrary JavaScript by crafting malicious STL template payloads that are decrypted and returned without proper sanitization. Attackers can exploit improper output encoding in the /api/stl/actions/dynamic endpoint to inject executable JavaScript into JSON responses, leading to session hijacking, phishing attacks, and unauthorized actions performed on behalf of users.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 2.1

Product Status

Vendor siteserver
Product SSCMS
Versions Default: unknown
  • Version 7.4.0 is affected

Credits

  • hss94531 (https://github.com/hss94531) other
  • Beatriz Fresno Naumova other

References

Problem Types

  • CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE