Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27627: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in karakeep-app karakeep

0
High
VulnerabilityCVE-2026-27627cvecve-2026-27627cwe-79
Published: Wed Feb 25 2026 (02/25/2026, 03:48:07 UTC)
Source: CVE Database V5
Vendor/Project: karakeep-app
Product: karakeep

Description

CVE-2026-27627 is a high-severity cross-site scripting (XSS) vulnerability in karakeep version 0. 30. 0. The flaw arises because the Reddit metascraper plugin returns HTML content that is directly injected into the application’s reader view without proper sanitization. Unlike other content sources that are sanitized with Readability and DOMPurify, the Reddit path bypasses these protections, allowing malicious HTML to execute in users' browsers via dangerouslySetInnerHTML. This vulnerability can lead to high confidentiality impact by exposing sensitive user data through script execution. The issue is patched in version 0. 31. 0. Exploitation requires user interaction but no authentication, and the attack can affect all users running the vulnerable version.

AI-Powered Analysis

AILast updated: 02/25/2026, 04:28:24 UTC

Technical Analysis

CVE-2026-27627 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting karakeep, a self-hostable bookmark management application. In version 0.30.0, the Reddit metascraper plugin returns HTML content labeled as `readableContentHtml`. This content is parsed and directly injected into the React component's reader view using dangerouslySetInnerHTML without passing through DOMPurify or Readability sanitization processes. Other content sources in the crawler pipeline are sanitized properly, but the Reddit path skips these steps, creating an injection vector. An attacker who can influence the Reddit content returned by the metascraper can embed malicious HTML or JavaScript, which executes in the context of the user's browser when viewing the reader. This can lead to theft of sensitive information such as cookies, session tokens, or other data accessible in the browser context, compromising confidentiality. The vulnerability does not require authentication but does require the user to interact with the malicious content. The scope is limited to users running version 0.30.0 of karakeep. The issue was addressed in version 0.31.0 by ensuring all content sources, including Reddit, are sanitized with DOMPurify before rendering. No known exploits are currently reported in the wild.

Potential Impact

The primary impact of this vulnerability is on confidentiality, as malicious scripts can steal sensitive user data such as authentication tokens, personal information, or other browser-stored secrets. Integrity impact is low since the vulnerability does not allow direct modification of backend data but could enable phishing or social engineering attacks by injecting misleading content. Availability is not affected. Because the vulnerability is exploitable remotely without authentication and only requires user interaction (viewing the malicious content), the attack surface is broad among users of the vulnerable version. Organizations using karakeep for managing bookmarks or aggregating web content risk data leakage and session hijacking. This could lead to unauthorized access to internal resources if session tokens are compromised. The vulnerability undermines user trust and could facilitate further attacks such as lateral movement or persistent browser-based exploits. Although no active exploits are known, the high CVSS score (8.2) reflects the ease of exploitation and significant confidentiality impact.

Mitigation Recommendations

The most effective mitigation is to upgrade karakeep to version 0.31.0 or later, where the Reddit metascraper content is properly sanitized with DOMPurify. Until upgrade is possible, organizations should consider disabling the Reddit metascraper plugin to eliminate the attack vector. Implement Content Security Policy (CSP) headers that restrict script execution and mitigate the impact of injected scripts. Educate users about the risks of interacting with untrusted content within the app. Monitor network traffic and application logs for unusual activity related to Reddit content fetching. For self-hosted deployments, review and harden the sanitization pipeline to ensure all external content is sanitized consistently. Conduct regular security audits of third-party plugins and dependencies. Employ browser security features such as SameSite cookies and HTTPOnly flags to reduce token theft risk. Finally, maintain an incident response plan to quickly address any exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T22:02:30.027Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699e7673b7ef31ef0bd379a7

Added to database: 2/25/2026, 4:11:31 AM

Last enriched: 2/25/2026, 4:28:24 AM

Last updated: 2/25/2026, 6:16:24 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats