DBHcms v1.2.0 has a reflected xss vulnerability as there is no security filter in dbhcms\mod\mod.selector.php line 108 for $_GET['return_name'] parameter, A remote authenticated with admin user can exploit this vulnerability to hijack other users.
- https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#6
- https://github.com/fragrant10/cve