CVE-2020-23049
PHP vulnerability analysis and mitigation

Overview

A vulnerability was discovered in Fork CMS v5.8.0 that allows remote attackers to inject malicious script code with persistent attack vectors to compromise browser-to-web-application requests (Vulnerability Lab). The vulnerability was disclosed on April 16, 2020, and affects the displayname input field when using Add, Edit, or Register mechanisms.

Technical details

The vulnerability exists in the Displayname input field that forwards information into the var parameter. The issue occurs because the var parameter does not encode or parse the injected content and executes it instead. The vulnerability can be exploited via POST requests, with injection points in the registration form and add/edit user functions. The execution points occur in the preview profile, edit user, user index listing, and delete user message context (Vulnerability Lab).

Impact

Successful exploitation of the vulnerability can result in session hijacking, persistent phishing attacks, persistent external redirects to malicious sources, and persistent manipulation of affected application modules. The vulnerability affects multiple modules including Preview Profile, Edit User, User Index, and Delete User (Vulnerability Lab).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23622HIGH8.7
  • PHPPHP
  • alextselegidis/easyappointments
NoNoJan 15, 2026
CVE-2025-14894HIGH7.5
  • PHPPHP
  • livewire-filemanager/filemanager
NoNoJan 16, 2026
CVE-2026-23626MEDIUM6.8
  • PHPPHP
  • kimai/kimai
NoYesJan 18, 2026
CVE-2025-69198MEDIUM6
  • PHPPHP
  • pterodactyl/panel
NoYesJan 19, 2026
CVE-2026-23496MEDIUM5.4
  • PHPPHP
  • pimcore/web2print-tools-bundle
NoYesJan 15, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management