Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25868: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in MiniGal MiniGal Nano

0
Medium
VulnerabilityCVE-2026-25868cvecve-2026-25868cwe-79
Published: Wed Feb 11 2026 (02/11/2026, 15:34:45 UTC)
Source: CVE Database V5
Vendor/Project: MiniGal
Product: MiniGal Nano

Description

MiniGal Nano version 0.3.5 and prior contain a reflected cross-site scripting (XSS) vulnerability in index.php via the dir parameter. The application constructs $currentdir from user-controlled input and embeds it into an error message without output encoding, allowing an attacker to supply HTML/JavaScript that is reflected in the response. Successful exploitation can lead to execution of arbitrary script in a victim's browser in the context of the vulnerable application.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 09:23:30 UTC

Technical Analysis

CVE-2026-25868 is a reflected cross-site scripting (XSS) vulnerability identified in MiniGal Nano, a lightweight photo gallery web application, affecting version 0.3.5 and prior. The vulnerability exists in the index.php script where the 'dir' parameter is taken from user input and used to construct the variable $currentdir, which is then embedded directly into an error message without any output encoding or sanitization. This improper neutralization of input (CWE-79) allows an attacker to inject arbitrary HTML or JavaScript code that is reflected back in the HTTP response. When a victim visits a crafted URL containing malicious script in the 'dir' parameter, the script executes in their browser within the security context of the MiniGal Nano application. This can lead to theft of session cookies, defacement, or redirection to malicious sites. The vulnerability is remotely exploitable over the network without requiring authentication or privileges, but it does require user interaction to trigger the malicious payload. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required for the attack to succeed, and low scope impact. No patches or official fixes are currently available, and no known exploits have been reported in the wild. The vulnerability was published on February 11, 2026, and assigned by VulnCheck. MiniGal Nano is typically used by small to medium websites or personal galleries, which may limit the scale of impact but still poses a risk to users of affected installations.

Potential Impact

The primary impact of this vulnerability is the potential execution of arbitrary scripts in users' browsers, which can compromise confidentiality and integrity of user sessions. Attackers can steal cookies or authentication tokens, perform actions on behalf of the user, or redirect users to malicious websites. This can lead to account compromise, data theft, or distribution of malware. While the vulnerability does not directly affect server availability or integrity, successful exploitation can damage the reputation of affected organizations and erode user trust. Because MiniGal Nano is often deployed on smaller or personal websites, the impact may be localized but still significant for those users. The lack of authentication requirement and ease of exploitation increase the risk, especially if attackers can lure users to maliciously crafted URLs. Organizations worldwide using MiniGal Nano are at risk of targeted attacks, especially those with public-facing galleries or user communities.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately implement output encoding or sanitization on the 'dir' parameter before embedding it into any HTML response. Specifically, applying context-appropriate HTML entity encoding to user-supplied input prevents script injection. If possible, upgrade to a fixed version of MiniGal Nano once available. In the absence of an official patch, web application firewalls (WAFs) can be configured to detect and block suspicious requests containing script tags or common XSS payloads targeting the 'dir' parameter. Additionally, administrators should educate users about the risks of clicking on untrusted links and consider implementing Content Security Policy (CSP) headers to restrict script execution sources. Regularly monitoring web server logs for unusual requests and scanning the application with automated security tools can help detect exploitation attempts. Finally, isolating the MiniGal Nano installation and limiting its permissions can reduce potential damage from successful attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-06T19:12:03.464Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698ca44a4b57a58fa1a27f6a

Added to database: 2/11/2026, 3:46:18 PM

Last enriched: 3/5/2026, 9:23:30 AM

Last updated: 3/28/2026, 10:06:32 PM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses