CVE-2026-27612: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in denpiligrim repostat
CVE-2026-27612 is a reflected Cross-Site Scripting (XSS) vulnerability in the denpiligrim repostat React component versions prior to 1. 0. 1. The vulnerability arises because the RepoCard component uses React's dangerouslySetInnerHTML to render the repository name during loading without sanitizing input. If untrusted user input is passed to the repo prop, an attacker can execute arbitrary JavaScript in the user's browser. This can lead to theft of sensitive information or session hijacking. The issue was fixed in version 1. 0. 1 by removing dangerouslySetInnerHTML and using safe JSX data binding that escapes HTML entities. The CVSS score is 6.
AI Analysis
Technical Summary
The vulnerability CVE-2026-27612 affects the denpiligrim repostat React component, specifically versions before 1.0.1. The component's RepoCard uses React's dangerouslySetInnerHTML to render the repository name (repo prop) during the loading state. This method bypasses React's default HTML escaping, allowing raw HTML or script injection if the input is not sanitized. If a developer passes untrusted user input directly to the repo prop—such as from a URL query parameter—an attacker can craft malicious input that executes arbitrary JavaScript in the victim's browser context. This reflected XSS can lead to session hijacking, credential theft, or other malicious actions within the user's session. The vulnerability does not require authentication but does require user interaction (e.g., clicking a crafted link). The fix in version 1.0.1 replaces dangerouslySetInnerHTML with standard JSX data binding, which automatically escapes HTML entities, mitigating the risk. The CVSS 3.1 score of 6.1 reflects a network attack vector with low complexity, no privileges required, user interaction needed, and partial impact on confidentiality and integrity but no impact on availability. No known exploits have been reported in the wild, but the vulnerability poses a moderate risk to applications using affected versions of repostat that incorporate untrusted input into the repo prop.
Potential Impact
The primary impact of this vulnerability is the potential for attackers to execute arbitrary JavaScript in the context of users' browsers when interacting with applications using vulnerable versions of repostat. This can lead to theft of sensitive information such as authentication tokens, cookies, or personal data, enabling session hijacking or impersonation. It can also facilitate further attacks like redirecting users to malicious sites or performing unauthorized actions on behalf of the user. Since repostat is a React component designed to display GitHub repository information, applications integrating it may expose their users to these risks if they do not sanitize inputs passed to the repo prop. The vulnerability affects confidentiality and integrity but does not impact system availability. Organizations relying on repostat in web applications, especially those that incorporate user input into the repo prop without validation, face moderate risk of client-side compromise. The risk is heightened in environments where users have elevated privileges or access sensitive data through the affected application.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade to repostat version 1.0.1 or later, where the use of dangerouslySetInnerHTML has been removed and safe JSX data binding is used. Developers must ensure that any input passed to the repo prop is strictly validated and sanitized, especially if it originates from user-controlled sources such as URL parameters or form inputs. Avoid passing raw user input directly to the repo prop. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Conduct thorough code reviews and security testing focusing on input handling in components that render HTML content. Additionally, educate developers on the risks of using dangerouslySetInnerHTML and promote safe React coding practices. Monitoring web application logs for suspicious activity and anomalous input patterns can help detect exploitation attempts. Finally, inform users to avoid clicking suspicious links that may exploit this vulnerability until patches are applied.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2026-27612: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in denpiligrim repostat
Description
CVE-2026-27612 is a reflected Cross-Site Scripting (XSS) vulnerability in the denpiligrim repostat React component versions prior to 1. 0. 1. The vulnerability arises because the RepoCard component uses React's dangerouslySetInnerHTML to render the repository name during loading without sanitizing input. If untrusted user input is passed to the repo prop, an attacker can execute arbitrary JavaScript in the user's browser. This can lead to theft of sensitive information or session hijacking. The issue was fixed in version 1. 0. 1 by removing dangerouslySetInnerHTML and using safe JSX data binding that escapes HTML entities. The CVSS score is 6.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2026-27612 affects the denpiligrim repostat React component, specifically versions before 1.0.1. The component's RepoCard uses React's dangerouslySetInnerHTML to render the repository name (repo prop) during the loading state. This method bypasses React's default HTML escaping, allowing raw HTML or script injection if the input is not sanitized. If a developer passes untrusted user input directly to the repo prop—such as from a URL query parameter—an attacker can craft malicious input that executes arbitrary JavaScript in the victim's browser context. This reflected XSS can lead to session hijacking, credential theft, or other malicious actions within the user's session. The vulnerability does not require authentication but does require user interaction (e.g., clicking a crafted link). The fix in version 1.0.1 replaces dangerouslySetInnerHTML with standard JSX data binding, which automatically escapes HTML entities, mitigating the risk. The CVSS 3.1 score of 6.1 reflects a network attack vector with low complexity, no privileges required, user interaction needed, and partial impact on confidentiality and integrity but no impact on availability. No known exploits have been reported in the wild, but the vulnerability poses a moderate risk to applications using affected versions of repostat that incorporate untrusted input into the repo prop.
Potential Impact
The primary impact of this vulnerability is the potential for attackers to execute arbitrary JavaScript in the context of users' browsers when interacting with applications using vulnerable versions of repostat. This can lead to theft of sensitive information such as authentication tokens, cookies, or personal data, enabling session hijacking or impersonation. It can also facilitate further attacks like redirecting users to malicious sites or performing unauthorized actions on behalf of the user. Since repostat is a React component designed to display GitHub repository information, applications integrating it may expose their users to these risks if they do not sanitize inputs passed to the repo prop. The vulnerability affects confidentiality and integrity but does not impact system availability. Organizations relying on repostat in web applications, especially those that incorporate user input into the repo prop without validation, face moderate risk of client-side compromise. The risk is heightened in environments where users have elevated privileges or access sensitive data through the affected application.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade to repostat version 1.0.1 or later, where the use of dangerouslySetInnerHTML has been removed and safe JSX data binding is used. Developers must ensure that any input passed to the repo prop is strictly validated and sanitized, especially if it originates from user-controlled sources such as URL parameters or form inputs. Avoid passing raw user input directly to the repo prop. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Conduct thorough code reviews and security testing focusing on input handling in components that render HTML content. Additionally, educate developers on the risks of using dangerouslySetInnerHTML and promote safe React coding practices. Monitoring web application logs for suspicious activity and anomalous input patterns can help detect exploitation attempts. Finally, inform users to avoid clicking suspicious links that may exploit this vulnerability until patches are applied.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-20T19:43:14.602Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699e6864b7ef31ef0bae9d16
Added to database: 2/25/2026, 3:11:32 AM
Last enriched: 2/25/2026, 3:28:01 AM
Last updated: 2/25/2026, 8:44:13 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3192: Improper Authentication in Chia Blockchain
MediumCVE-2026-3189: Server-Side Request Forgery in feiyuchuixue sz-boot-parent
LowCVE-2026-27727: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in swaldman mchange-commons-java
HighCVE-2026-27706: CWE-918: Server-Side Request Forgery (SSRF) in makeplane plane
HighCVE-2026-27705: CWE-639: Authorization Bypass Through User-Controlled Key in makeplane plane
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.