PatchSiren cyber security CVE debrief
CVE-2026-29934 Lightcms Project CVE debrief
CVE-2026-29934 is a reflected cross-site scripting (XSS) issue affecting Lightcms v2.0 in the /admin/menus component. According to the NVD record, the flaw can be triggered by modifying the Referer request header, allowing attacker-controlled script to run in the context of the victim’s browser.
- Vendor
- Lightcms Project
- Product
- CVE-2026-29934
- CVSS
- MEDIUM 6.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-03-26
- Original CVE updated
- 2026-05-10
- Advisory published
- 2026-03-26
- Advisory updated
- 2026-05-10
Who should care
Administrators and security teams running Lightcms v2.0, especially if the /admin/menus interface is reachable by authenticated users. Web application defenders should also care because the issue affects browser-side execution in an administrative path.
Technical summary
The NVD entry classifies the issue as CWE-79 (Improper Neutralization of Input During Web Page Generation). The CVSS vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating a network-exploitable reflected XSS that requires user interaction and can impact confidentiality and integrity in the browser context. The vulnerability is described as arising from unsafely handling the Referer header in /admin/menus.
Defensive priority
Medium: the vulnerability is user-interaction dependent, but it affects an admin-facing component and can execute arbitrary JavaScript in a browser session.
Recommended defensive actions
- Review the /admin/menus code path for any use of the Referer header or other request headers in rendered output.
- Apply context-appropriate output encoding and input validation for all reflected request data.
- Confirm whether a vendor or project fix is available and deploy it to any affected Lightcms v2.0 instance.
- Restrict access to administrative interfaces where practical, and monitor for unusual requests to /admin/menus.
- Use browser-side and application-layer defenses such as CSP and secure session handling to reduce XSS impact.
Evidence notes
Supported by the NVD modified record for CVE-2026-29934, which lists Lightcms v2.0 as affected and classifies the weakness as CWE-79. The record also links to a GitHub issue (eddy8/LightCMS/issues/38) labeled as exploit/issue tracking/mitigation. No patch details, vendor advisory text, or proof-of-concept details were included in the supplied corpus.
Official resources
-
CVE-2026-29934 CVE record
CVE.org
-
CVE-2026-29934 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Exploit, Issue Tracking, Mitigation
CVE published: 2026-03-26T15:16:36.017Z. CVE modified: 2026-05-10T14:16:49.260Z. The supplied corpus does not identify a KEV listing or ransomware association.