<?xml version="1.0" encoding="UTF-8"?>    <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
      <channel>
        <title>XSS Vulnerability Report</title>
        <link>https://interactivetools.com/forum/forum-posts.php?XSS-Vulnerability-Report-82567</link>
        <description></description>
        <pubDate>Mon, 16 Mar 2026 22:20:51 -0700</pubDate>
        <language>en-us</language>
        <atom:link href="https://interactivetools.com/forum/forum-posts.php?rss=1&amp;XSS-Vulnerability-Report-82567" rel="self" type="application/rss+xml" />

                <item>
          <title>XSS Vulnerability Report</title>
          <link>https://interactivetools.com/forum/forum-posts.php?postNum=2246084#post2246084</link>
          <description><![CDATA[<p>Awesome! Thanks so much! That seems to have done the trick. I'll keep an eye out for future updates as well. Really appreciate it! :-)</p>
<p>All the best,<br />Jeremy</p>]]></description>
          <pubDate>Fri, 12 Aug 2022 09:36:35 -0700</pubDate>
          <guid isPermaLink="true">forum-posts.php?postNum=2246084#post2246084</guid>
        </item>
                <item>
          <title>XSS Vulnerability Report</title>
          <link>https://interactivetools.com/forum/forum-posts.php?postNum=2246081#post2246081</link>
          <description><![CDATA[<p>Hi Jeremy,</p>
<p>Thank you for bringing this to our attention!</p>
<p>As a short-term patch, you can update /cmsb/lib/init.php at line 649 from this:</p>
<pre class="language-php"><code>alert(sprintf(t("Updating Program Url to: %s")."&lt;br&gt;\n", $SETTINGS['adminUrl']));</code></pre>
<p>to this:</p>
<pre class="language-php"><code>alert(sprintf(t("Updating Program Url to: %s")."&lt;br&gt;\n", htmlencode($SETTINGS['adminUrl'])));</code></pre>
<p>This should - at a minimum - remove the XSS vulnerability reported, though we'll also be doing a review of some underlying factors and will release this and any additional security fixes in the next version of CMSB.</p>
<p>Let me know if you have any further questions!</p>
<p>Thanks again,</p>]]></description>
          <pubDate>Thu, 11 Aug 2022 12:42:53 -0700</pubDate>
          <guid isPermaLink="true">forum-posts.php?postNum=2246081#post2246081</guid>
        </item>
                <item>
          <title>XSS Vulnerability Report</title>
          <link>https://interactivetools.com/forum/forum-posts.php?postNum=2246080#post2246080</link>
          <description><![CDATA[<p>Hi all! My client recently received a report of a potential XSS vulnerability related to the CMS Builder login page. I'm not sure if there's any validity to this or if it's anything to be concerned with, but I thought I'd reach out and get your advice. Here's the vulnerability report:</p>
<p><a href="https://www.openbugbounty.org/reports/2613835/" rel="nofollow">https://www.openbugbounty.org/reports/2613835/</a></p>
<p>It looks like they are inserting script tags in the URL. Perhaps there's a way to disallow this via the .htaccess file?</p>
<p>Any input is appreciated. :-)</p>
<p>Thanks in advance,<br />Jeremy</p>]]></description>
          <pubDate>Wed, 10 Aug 2022 13:14:26 -0700</pubDate>
          <guid isPermaLink="true">forum-posts.php?postNum=2246080#post2246080</guid>
        </item>
              </channel>
    </rss>
  