CVE-2026-29840: n/a
JiZhiCMS version 2. 5. 6 and earlier contains a stored Cross-Site Scripting (XSS) vulnerability in the release function of UserController. php. The vulnerability arises because the application attempts to sanitize input by filtering <script> tags but fails to remove dangerous event handlers such as 'onerror' in other HTML tags like <img>. An authenticated attacker can exploit this by injecting malicious scripts via the 'body' parameter in a POST request to /user/release. html. This can lead to the execution of arbitrary scripts in the context of the victim's browser, potentially compromising user data and session integrity. The CVSS score is 5. 4, indicating a medium severity level.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-29840 affects JiZhiCMS versions 2.5.6 and earlier. It is a stored Cross-Site Scripting (XSS) flaw located in the release function within the app/home/c/UserController.php file. The root cause is insufficient input sanitization: while the application attempts to filter out <script> tags from user input, it does not recursively sanitize other HTML elements that can carry malicious event handlers, such as 'onerror' attributes in <img> tags. This incomplete sanitization allows an authenticated remote attacker to inject arbitrary JavaScript or HTML code into the 'body' parameter of a POST request to the /user/release.html endpoint. Because the malicious payload is stored, it can be served to other users or the attacker themselves, leading to script execution in their browsers. The vulnerability impacts confidentiality and integrity by enabling session hijacking, credential theft, or unauthorized actions performed on behalf of users. The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) indicates network attack vector, low attack complexity, requires privileges (authenticated user), requires user interaction, and affects confidentiality and integrity with no impact on availability. No patches or known exploits are currently reported, but the vulnerability is publicly disclosed, increasing the risk of future exploitation.
Potential Impact
If exploited, this stored XSS vulnerability could allow attackers to execute arbitrary scripts in the context of authenticated users, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions within the application. Since the vulnerability requires authentication, the attacker must have valid credentials, limiting exposure to internal or compromised users. However, the scope of impact includes any organization using JiZhiCMS versions 2.5.6 or earlier, especially those with multiple users or administrators who might be targeted. The vulnerability could facilitate lateral movement within an organization or compromise user trust. Although no availability impact is noted, the confidentiality and integrity risks are significant enough to warrant prompt remediation. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as the vulnerability is publicly documented.
Mitigation Recommendations
Organizations should immediately review and upgrade JiZhiCMS to a version that addresses this vulnerability once available. In the absence of an official patch, implement additional input validation and sanitization on the server side, ensuring recursive removal of all potentially dangerous HTML attributes, including event handlers like 'onerror'. Employ a robust web application firewall (WAF) configured to detect and block malicious payloads targeting XSS vectors. Limit user privileges to the minimum necessary to reduce the risk of authenticated attackers exploiting this flaw. Conduct regular security audits and penetration testing focusing on input validation mechanisms. Educate users about the risks of clicking on suspicious links or executing unexpected scripts. Monitor application logs for unusual POST requests to /user/release.html and anomalous user behavior that may indicate exploitation attempts.
Affected Countries
China, United States, India, Germany, Brazil, Russia, Japan, South Korea, United Kingdom, France
CVE-2026-29840: n/a
Description
JiZhiCMS version 2. 5. 6 and earlier contains a stored Cross-Site Scripting (XSS) vulnerability in the release function of UserController. php. The vulnerability arises because the application attempts to sanitize input by filtering <script> tags but fails to remove dangerous event handlers such as 'onerror' in other HTML tags like <img>. An authenticated attacker can exploit this by injecting malicious scripts via the 'body' parameter in a POST request to /user/release. html. This can lead to the execution of arbitrary scripts in the context of the victim's browser, potentially compromising user data and session integrity. The CVSS score is 5. 4, indicating a medium severity level.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-29840 affects JiZhiCMS versions 2.5.6 and earlier. It is a stored Cross-Site Scripting (XSS) flaw located in the release function within the app/home/c/UserController.php file. The root cause is insufficient input sanitization: while the application attempts to filter out <script> tags from user input, it does not recursively sanitize other HTML elements that can carry malicious event handlers, such as 'onerror' attributes in <img> tags. This incomplete sanitization allows an authenticated remote attacker to inject arbitrary JavaScript or HTML code into the 'body' parameter of a POST request to the /user/release.html endpoint. Because the malicious payload is stored, it can be served to other users or the attacker themselves, leading to script execution in their browsers. The vulnerability impacts confidentiality and integrity by enabling session hijacking, credential theft, or unauthorized actions performed on behalf of users. The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) indicates network attack vector, low attack complexity, requires privileges (authenticated user), requires user interaction, and affects confidentiality and integrity with no impact on availability. No patches or known exploits are currently reported, but the vulnerability is publicly disclosed, increasing the risk of future exploitation.
Potential Impact
If exploited, this stored XSS vulnerability could allow attackers to execute arbitrary scripts in the context of authenticated users, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions within the application. Since the vulnerability requires authentication, the attacker must have valid credentials, limiting exposure to internal or compromised users. However, the scope of impact includes any organization using JiZhiCMS versions 2.5.6 or earlier, especially those with multiple users or administrators who might be targeted. The vulnerability could facilitate lateral movement within an organization or compromise user trust. Although no availability impact is noted, the confidentiality and integrity risks are significant enough to warrant prompt remediation. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as the vulnerability is publicly documented.
Mitigation Recommendations
Organizations should immediately review and upgrade JiZhiCMS to a version that addresses this vulnerability once available. In the absence of an official patch, implement additional input validation and sanitization on the server side, ensuring recursive removal of all potentially dangerous HTML attributes, including event handlers like 'onerror'. Employ a robust web application firewall (WAF) configured to detect and block malicious payloads targeting XSS vectors. Limit user privileges to the minimum necessary to reduce the risk of authenticated attackers exploiting this flaw. Conduct regular security audits and penetration testing focusing on input validation mechanisms. Educate users about the risks of clicking on suspicious links or executing unexpected scripts. Monitor application logs for unusual POST requests to /user/release.html and anomalous user behavior that may indicate exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-03-04T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69c2b56bf4197a8e3b4a080e
Added to database: 3/24/2026, 4:01:47 PM
Last enriched: 3/31/2026, 8:34:44 PM
Last updated: 5/7/2026, 4:12:15 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.