CVE-2026-29840
Received Received - Intake
Stored XSS in JiZhiCMS UserController Allows Script Injection

Publication date: 2026-03-24

Last updated on: 2026-03-25

Assigner: MITRE

Description
JiZhiCMS v2.5.6 and before contains a Stored Cross-Site Scripting (XSS) vulnerability in the release function within app/home/c/UserController.php. The application attempts to sanitize input by filtering <script> tags but fails to recursively remove dangerous event handlers in other HTML tags (such as onerror in <img> tags). This allows an authenticated remote attacker to inject arbitrary web script or HTML via the body parameter in a POST request to /user/release.html.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-24
Last Modified
2026-03-25
Generated
2026-05-07
AI Q&A
2026-03-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
jizhicms jizhicms to 2.5.6 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-29840 is a Stored Cross-Site Scripting (XSS) vulnerability found in JiZhiCMS version 2.5.6 and earlier. It exists in the release function within the app/home/c/UserController.php file, specifically at the /user/release.html endpoint.'}, {'type': 'paragraph', 'content': 'The application tries to sanitize user input by filtering out <script> tags, but it fails to remove dangerous event-handler attributes like onerror in other HTML tags such as <img>. This incomplete sanitization allows an authenticated attacker to inject malicious web scripts or HTML via the body parameter in a POST request.'}, {'type': 'paragraph', 'content': "When this malicious content is later displayed, it executes arbitrary JavaScript in the victim's browser, potentially leading to harmful actions such as session theft or privilege escalation."}] [1]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': "This vulnerability can allow an authenticated remote attacker to inject and execute arbitrary JavaScript code in the context of other users' browsers when they view the malicious content."}, {'type': 'list_item', 'content': 'Session theft: Attackers can steal session cookies, potentially hijacking user sessions.'}, {'type': 'list_item', 'content': "Privilege escalation: Depending on the victim's privileges, attackers might perform actions on their behalf."}, {'type': 'list_item', 'content': 'Compromise of user data and integrity of the application.'}] [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring POST requests to the /user/release.html endpoint, specifically looking for the presence of suspicious or crafted content in the body parameter that includes event-handler attributes such as onerror within HTML tags.'}, {'type': 'paragraph', 'content': 'Since the vulnerability requires authentication, detection involves checking authenticated user activity for unusual or unexpected input containing HTML with event handlers.'}, {'type': 'paragraph', 'content': "A possible command to detect attempts could be using web server logs or network traffic inspection tools to filter POST requests to /user/release.html containing the body parameter with suspicious patterns like 'onerror=' or other event handlers."}, {'type': 'list_item', 'content': "Example using grep on web server logs: grep -i 'POST /user/release.html' access.log | grep -i 'body=.*onerror='"}, {'type': 'list_item', 'content': 'Using a network capture tool like tcpdump or Wireshark to filter HTTP POST requests to /user/release.html and inspect the body parameter for event-handler attributes.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting or monitoring authenticated user input to the /user/release.html endpoint, especially the body parameter, to prevent injection of malicious event-handler attributes.

Applying input validation and sanitization that properly removes or neutralizes all dangerous HTML event handlers, not just <script> tags, is critical.

If possible, update JiZhiCMS to a version later than 2.5.6 where this vulnerability is fixed.

As a temporary workaround, consider restricting access to the vulnerable endpoint to trusted users only and monitoring logs for suspicious activity.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart