Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29038: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dgtlmoon changedetection.io

0
Medium
VulnerabilityCVE-2026-29038cvecve-2026-29038cwe-79
Published: Fri Mar 06 2026 (03/06/2026, 06:53:56 UTC)
Source: CVE Database V5
Vendor/Project: dgtlmoon
Product: changedetection.io

Description

CVE-2026-29038 is a reflected cross-site scripting (XSS) vulnerability in changedetection. io versions prior to 0. 54. 4. The vulnerability exists in the /rss/tag/ endpoint where the tag_uuid parameter is reflected without proper HTML escaping, allowing injected JavaScript to execute in the victim's browser. This occurs because the Flask framework returns text/html by default for plain string responses, enabling script execution. Exploitation requires user interaction, such as clicking a crafted URL. The vulnerability impacts confidentiality and integrity but not availability, with a CVSS score of 6. 1 (medium severity). The issue has been patched in version 0.

AI-Powered Analysis

AILast updated: 03/06/2026, 07:31:24 UTC

Technical Analysis

CVE-2026-29038 is a reflected cross-site scripting (XSS) vulnerability identified in the open-source web page change detection tool changedetection.io, specifically in versions prior to 0.54.4. The vulnerability resides in the /rss/tag/ endpoint, where the tag_uuid path parameter is directly reflected in the HTTP response body without proper HTML escaping or sanitization. Because changedetection.io uses the Flask web framework, which by default returns responses with a content type of text/html for plain string responses, any malicious JavaScript code injected via the tag_uuid parameter is parsed and executed by the victim's browser. This allows an attacker to craft a malicious URL that, when visited by a user, executes arbitrary JavaScript in the context of the changedetection.io web application. Such execution can lead to theft of session tokens, manipulation of page content, or other malicious actions affecting the confidentiality and integrity of user data. The vulnerability does not impact availability and does not require authentication, but it does require user interaction (clicking a malicious link). The issue has been addressed and patched in version 0.54.4 by implementing proper input neutralization and escaping. No known exploits are currently reported in the wild. The CVSS v3.1 base score is 6.1, reflecting medium severity with network attack vector, low attack complexity, no privileges required, user interaction required, and scope changed due to the potential impact on user data beyond the vulnerable component.

Potential Impact

The primary impact of this vulnerability is on the confidentiality and integrity of users interacting with affected instances of changedetection.io. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the victim’s browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. Since changedetection.io is a web-based tool used for monitoring web page changes, compromised user sessions could lead to unauthorized access to monitored data or manipulation of monitoring results. Although availability is not affected, the trustworthiness of the application and user data integrity is at risk. Organizations relying on changedetection.io for critical monitoring tasks could face data leakage or manipulation risks. The vulnerability’s exploitation requires user interaction, which somewhat limits automated widespread exploitation but does not eliminate targeted phishing or social engineering attacks. Given that changedetection.io is open source and can be self-hosted, organizations running vulnerable versions in internal or external environments are at risk, especially if exposed to untrusted users or the internet.

Mitigation Recommendations

The primary mitigation is to upgrade changedetection.io to version 0.54.4 or later, where the vulnerability has been patched by implementing proper HTML escaping of user-supplied input in the tag_uuid parameter. For organizations unable to immediately upgrade, applying web application firewall (WAF) rules to detect and block suspicious input patterns targeting the /rss/tag/ endpoint can reduce risk. Additionally, administrators should audit and sanitize all user inputs reflected in HTTP responses to prevent similar XSS issues. Employing Content Security Policy (CSP) headers can help mitigate the impact of any injected scripts by restricting script execution sources. Educating users about the risks of clicking untrusted links and implementing multi-factor authentication can reduce the impact of session hijacking attempts. Regular security assessments and code reviews focusing on input validation and output encoding are recommended to prevent future injection vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-03T17:50:11.242Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69aa7f36c48b3f10ff26b925

Added to database: 3/6/2026, 7:16:06 AM

Last enriched: 3/6/2026, 7:31:24 AM

Last updated: 3/6/2026, 10:10:55 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses