Stored Cross-Site Scripting in Textpattern CMS by Textpattern
CVE-2023-53911
5.1MEDIUM
Key Information:
- Vendor
Tmrswrr
- Status
- Vendor
- CVE Published:
- 17 December 2025
Badges
๐พ Exploit Exists๐ก Public PoC
What is CVE-2023-53911?
Textpattern CMS version 4.8.8 has a vulnerability that allows authenticated users to exploit the article excerpt field for stored cross-site scripting. By injecting malicious JavaScript payloads in the excerpt, attackers can execute harmful scripts when other users view the affected articles. This poses a significant risk to the integrity and security of user-generated content, allowing potential data theft or manipulation.
Affected Version(s)
Textpattern CMS 4.8.8
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Score:
5.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
tmrswrr
