CVE-2026-24127
BaseFortify
Publication date: 2026-01-23
Last updated on: 2026-02-02
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| typemill | typemill | to 2.19.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
| CWE-116 | The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a reflected Cross-Site Scripting (XSS) issue in Typemill CMS versions 2.19.1 and below. Specifically, the login error view template `login.twig` improperly handles the `username` value by echoing it back without proper contextual encoding when authentication fails. This allows an attacker to inject and execute malicious scripts in the context of the login page.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can execute arbitrary scripts in the login page context, potentially leading to theft of user credentials, session hijacking, or other malicious actions performed on behalf of the user. This can compromise the security of the affected website and its users.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Typemill to version 2.19.2 or later, as this version contains the fix for the reflected Cross-Site Scripting vulnerability in the login error view template.