Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27639: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dbarzin mercator

0
High
VulnerabilityCVE-2026-27639cvecve-2026-27639cwe-79
Published: Wed Feb 25 2026 (02/25/2026, 03:44:26 UTC)
Source: CVE Database V5
Vendor/Project: dbarzin
Product: mercator

Description

Mercator is an open source web application designed to enable mapping of information systems. A stored Cross-Site Scripting (XSS) vulnerability exists in Mercator prior to version 2026.02.22 due to the use of unescaped Blade directives (`{!! !!}`) in display templates. An authenticated user with the User role can inject arbitrary JavaScript payloads into fields such as "contact point" when creating or editing entities. The payload is then executed in the browser of any user who views the affected page, including administrators. Version 2026.02.22 fixes the vulnerability.

AI-Powered Analysis

AILast updated: 02/25/2026, 04:27:16 UTC

Technical Analysis

Mercator is an open-source web application designed for mapping information systems. A stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2026-27639 exists in Mercator versions prior to 2026.02.22. The root cause is the use of unescaped Blade directives (`{!! !!}`) in the display templates, which fail to properly neutralize user-supplied input. An authenticated user with the User role can inject arbitrary JavaScript code into input fields such as 'contact point' when creating or editing entities. This malicious script is stored persistently and executed in the browsers of any users who subsequently view the affected page, including administrators. The vulnerability does not require elevated privileges beyond a standard User role, nor does it require additional user interaction beyond page viewing. The CVSS 4.0 score is 8.5 (high severity), reflecting network attack vector, low attack complexity, no privileges required beyond User role, and partial user interaction (viewing the page). The impact on confidentiality and integrity is high due to potential session hijacking, data theft, or unauthorized actions performed in the context of the victim’s session. Availability impact is not significant. No known exploits are reported in the wild as of publication. The vulnerability is fixed in Mercator version 2026.02.22 by properly escaping user input in templates to prevent script injection.

Potential Impact

The vulnerability allows attackers with authenticated User role access to inject persistent malicious JavaScript into Mercator’s web interface. This can lead to session hijacking, theft of sensitive information, unauthorized administrative actions, or distribution of malware to other users, including administrators. Organizations relying on Mercator for mapping critical information systems risk compromise of sensitive data and control mechanisms. The attack can facilitate lateral movement within networks or lead to broader compromise if administrative accounts are targeted. Since the vulnerability requires only authenticated User role access, insider threats or compromised user accounts can be leveraged to exploit this flaw. The widespread impact depends on Mercator’s deployment scale within organizations managing critical infrastructure or sensitive data. The lack of known exploits in the wild reduces immediate risk but does not preclude targeted attacks, especially in high-value environments.

Mitigation Recommendations

1. Upgrade Mercator installations to version 2026.02.22 or later, which includes the fix for this vulnerability. 2. Implement strict input validation and output encoding in all user-supplied fields, especially those rendered with Blade templates, to prevent injection of executable code. 3. Enforce the principle of least privilege by reviewing and restricting User role permissions to minimize the ability to inject malicious content. 4. Monitor application logs and user activities for unusual input patterns or script injection attempts. 5. Educate users and administrators about the risks of stored XSS and encourage cautious handling of user-generated content. 6. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 7. Conduct regular security assessments and code reviews focusing on template rendering and input handling. 8. Consider implementing multi-factor authentication to reduce the risk of compromised user accounts being exploited to inject malicious payloads.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T22:02:30.029Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e7673b7ef31ef0bd379b6

Added to database: 2/25/2026, 4:11:31 AM

Last enriched: 2/25/2026, 4:27:16 AM

Last updated: 2/26/2026, 9:36:29 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats