CVE-2026-7014 Overview
A Cross-Site Scripting (XSS) vulnerability has been identified in MaxSite CMS versions up to 109.3. This flaw affects the down_count plugin, specifically in the handling of the f_file and f_prefix arguments. Due to improper input sanitization, an attacker can inject malicious scripts that execute in the context of the victim's browser session.
Critical Impact
This vulnerability allows remote attackers to execute arbitrary JavaScript code through manipulated input parameters in the down_count plugin. While classified as "Self-XSS" by the vendor, it represents a violation of secure coding standards due to missing htmlspecialchars() filtering.
Affected Products
- MaxSite CMS versions up to and including 109.3
- MaxSite CMS down_count Plugin component
- Systems running unpatched MaxSite CMS installations
Discovery Timeline
- 2026-04-26 - CVE-2026-7014 published to NVD
- 2026-04-29 - Last updated in NVD database
Technical Details for CVE-2026-7014
Vulnerability Analysis
This vulnerability stems from improper input validation in the MaxSite CMS down_count plugin. The affected component fails to properly sanitize user-supplied input for the f_file and f_prefix arguments before rendering them in HTML output. Without proper encoding using functions like htmlspecialchars(), malicious payloads embedded in these parameters are executed as client-side scripts when the page is rendered in a user's browser.
The vendor has acknowledged this issue, classifying it as a "Self-XSS" vulnerability while recognizing it violates secure coding standards. The lack of filtering has been addressed in version 109.4 to prevent incorrect data display and potential script injection attacks.
Root Cause
The root cause of CVE-2026-7014 is the absence of proper output encoding when displaying user-controlled input values. Specifically, the down_count plugin directly outputs the f_file and f_prefix parameters without passing them through PHP's htmlspecialchars() function. This allows special characters like <, >, and " to be interpreted as HTML/JavaScript rather than being rendered as literal text.
Attack Vector
The attack vector is network-based, requiring an authenticated user with high privileges to interact with a manipulated page or form. The attacker crafts a malicious payload containing JavaScript code within the f_file or f_prefix parameters. When a victim with active session credentials views the affected page, the injected script executes within their browser context, potentially allowing session hijacking, data theft, or further exploitation.
The following patch demonstrates how the vulnerability was addressed by implementing proper output encoding:
// Security patch in application/maxsite/plugins/antispam/admin.php
// Before (vulnerable):
$form .= '<p><strong>' . t('Файл для логов:') . '</strong> ' . getinfo('uploads_dir') . ' <input name="f_logging_file" type="text" value="' . $options['logging_file'] . '">';
// After (fixed):
$form .= '<p><strong>' . t('Файл для логов:') . '</strong> ' . getinfo('uploads_dir') . ' <input name="f_logging_file" type="text" value="' . htmlspecialchars($options['logging_file']) . '">';
Source: GitHub Commit Details
Detection Methods for CVE-2026-7014
Indicators of Compromise
- Presence of unexpected JavaScript code or HTML tags in f_file or f_prefix parameter values in server logs
- Anomalous HTTP requests containing encoded script tags (%3Cscript%3E) targeting the down_count plugin endpoints
- Browser console errors or unexpected script execution when accessing MaxSite CMS admin pages
- User reports of suspicious pop-ups or redirects when interacting with download count features
Detection Strategies
- Implement Web Application Firewall (WAF) rules to detect and block XSS payloads in HTTP parameters targeting MaxSite CMS
- Monitor server access logs for requests containing common XSS patterns such as <script>, javascript:, or onerror=
- Deploy Content Security Policy (CSP) headers to restrict inline script execution and report violations
- Use automated vulnerability scanning tools to identify unpatched MaxSite CMS instances in your environment
Monitoring Recommendations
- Enable verbose logging for the down_count plugin to capture all parameter inputs
- Configure SIEM alerts for patterns matching XSS attack signatures in web server logs
- Regularly audit MaxSite CMS version numbers across all deployments to ensure patching compliance
- Monitor for unauthorized modifications to plugin files that may indicate post-exploitation activity
How to Mitigate CVE-2026-7014
Immediate Actions Required
- Upgrade MaxSite CMS to version 109.4 or later immediately to apply the security fix
- Review server logs for any evidence of exploitation attempts against the down_count plugin
- Implement input validation and output encoding in any custom code interacting with the affected plugin
- Deploy Web Application Firewall rules to block XSS attack patterns as a defense-in-depth measure
Patch Information
The vulnerability has been resolved in MaxSite CMS version 109.4. The security patch applies htmlspecialchars() encoding to user-supplied input values before rendering them in HTML output. The patch is identified by commit hash 8a3946bd0a54bfb72a4d57179fcd253f2c550cd7 and is available through the official GitHub CMS Repository.
To upgrade, download the latest release from the GitHub Release v109 page and follow the standard MaxSite CMS upgrade procedures.
Workarounds
- If immediate patching is not possible, disable the down_count plugin until the upgrade can be performed
- Implement server-side input validation to reject parameters containing HTML special characters
- Add Content-Security-Policy headers to restrict inline script execution as a temporary mitigation
- Restrict access to the MaxSite CMS administrative interface to trusted IP addresses only
# Example: Add CSP headers in Apache .htaccess
Header set Content-Security-Policy "default-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline'"
# Example: Restrict admin access by IP in .htaccess
<Files "admin.php">
Require ip 192.168.1.0/24
</Files>
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


