{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2020-37152","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2026-02-03T16:27:45.309Z","datePublished":"2026-02-05T16:13:42.999Z","dateUpdated":"2026-03-05T01:28:16.741Z"},"containers":{"cna":{"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-03-05T01:28:16.741Z"},"datePublic":"2020-04-01T00:00:00.000Z","title":"PHP-Fusion 9.03.50 panels.php - Cross-Site Scripting (XSS)","descriptions":[{"lang":"en","value":"PHP-Fusion 9.03.50 panels.php is vulnerable to cross-site scripting (XSS) via the 'panel_content' POST parameter. The application fails to properly sanitize user input before rendering it in the browser, allowing attackers to inject arbitrary JavaScript. This can be exploited by submitting crafted input to the 'panel_content' field in panels.php, resulting in execution of malicious scripts in the context of the affected site."}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)","cweId":"CWE-79","type":"CWE"}]}],"affected":[{"vendor":"PHP-Fusion","product":"PHP-Fusion","versions":[{"version":"9.03.50","status":"affected"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:php-fusion:php-fusion:9.03.10:*:*:*:*:*:*:*"}]}]}],"references":[{"url":"https://www.php-fusion.co.uk/","name":"Vendor Homepage","tags":["product"]},{"url":"https://www.exploit-db.com/exploits/48299","name":"ExploitDB-48299","tags":["exploit"]},{"name":"VulnCheck Advisory: PHP-Fusion 9.03.50 panels.php - Cross-Site Scripting (XSS)","tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/php-fusion-panelsphp-cross-site-scripting-xss"}],"credits":[{"lang":"en","value":"Unkn0wn (exploit author)","type":"finder"}],"x_generator":{"engine":"vulncheck"},"metrics":[{"format":"CVSS","cvssV4_0":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N","baseScore":5.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"PASSIVE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","subAvailabilityImpact":"NONE"}}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-05T16:33:07.383158Z","id":"CVE-2020-37152","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-05T16:34:35.394Z"}}]}}