Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29840: n/a

0
High
VulnerabilityCVE-2026-29840cvecve-2026-29840
Published: Tue Mar 24 2026 (03/24/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2026-29840 is a stored Cross-Site Scripting (XSS) vulnerability in JiZhiCMS version 2. 5. 6 and earlier. The flaw exists in the release function of the UserController. php file, where input sanitization attempts to filter out <script> tags but fails to remove dangerous event handlers like 'onerror' in other HTML tags. An authenticated attacker can exploit this by injecting malicious scripts via the 'body' parameter in a POST request to /user/release. html. This vulnerability allows persistent script injection that can execute in the context of other users' browsers. No public exploits are currently known, and no CVSS score has been assigned. The vulnerability requires authentication but no user interaction beyond that.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 16:19:05 UTC

Technical Analysis

CVE-2026-29840 is a stored Cross-Site Scripting (XSS) vulnerability identified in JiZhiCMS version 2.5.6 and earlier. The vulnerability resides in the release function within the app/home/c/UserController.php file. The application attempts to sanitize user input by filtering out <script> tags; however, this sanitization is incomplete because it does not recursively remove dangerous event handler attributes embedded in other HTML tags, such as 'onerror' in <img> tags. This oversight allows an authenticated remote attacker to inject arbitrary HTML or JavaScript code via the 'body' parameter in a POST request to the /user/release.html endpoint. Because the malicious script is stored persistently on the server, it can execute whenever other users view the affected content, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of victims. The vulnerability requires the attacker to be authenticated, which limits exposure to some extent but does not eliminate risk, especially in environments where user accounts may be compromised or where insider threats exist. No public exploits have been reported yet, and no official patch or CVSS score is currently available. The vulnerability highlights a common pitfall in input sanitization where filtering only specific tags is insufficient to prevent XSS, emphasizing the need for comprehensive input validation and output encoding.

Potential Impact

The impact of CVE-2026-29840 can be significant for organizations using JiZhiCMS, particularly those that allow multiple authenticated users to submit content via the vulnerable release function. Successful exploitation enables attackers to inject persistent malicious scripts that execute in the browsers of other users who view the compromised content. This can lead to session hijacking, theft of sensitive information such as cookies or credentials, unauthorized actions performed with victim privileges, and potential spread of malware. Since the vulnerability requires authentication, the risk is somewhat mitigated by limiting exploitation to users with accounts; however, in many CMS environments, user accounts may be numerous and have varying privilege levels, increasing the attack surface. The vulnerability could also facilitate privilege escalation if attackers leverage XSS to target administrative users. Additionally, organizations may suffer reputational damage and compliance issues if user data is compromised. The absence of a patch and public exploits means organizations should proactively address the issue before attackers develop weaponized payloads.

Mitigation Recommendations

To mitigate CVE-2026-29840, organizations should first check for and apply any official patches or updates from JiZhiCMS once available. In the absence of patches, immediate steps include implementing strict input validation and output encoding on the 'body' parameter to ensure that all HTML tags and attributes, especially event handlers like 'onerror', are properly sanitized or removed. Employing a well-maintained HTML sanitizer library that recursively cleans input is recommended over simple tag filtering. Additionally, enforcing Content Security Policy (CSP) headers can help restrict the execution of unauthorized scripts in browsers. Restricting user privileges to the minimum necessary reduces the risk of exploitation by limiting which users can submit content. Monitoring logs for suspicious POST requests to /user/release.html and anomalous user behavior can help detect attempted exploitation. Finally, educating users about the risks of XSS and maintaining strong authentication controls will further reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-03-04T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c2b56bf4197a8e3b4a080e

Added to database: 3/24/2026, 4:01:47 PM

Last enriched: 3/24/2026, 4:19:05 PM

Last updated: 3/24/2026, 6:52:17 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses