CVE-2026-29840
Stored XSS in JiZhiCMS UserController Allows Script Injection
Publication date: 2026-03-24
Last updated on: 2026-03-25
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| jizhicms | jizhicms | to 2.5.6 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2026-29840 is a Stored Cross-Site Scripting (XSS) vulnerability found in JiZhiCMS version 2.5.6 and earlier. It exists in the release function within the app/home/c/UserController.php file, specifically at the /user/release.html endpoint.'}, {'type': 'paragraph', 'content': 'The application tries to sanitize user input by filtering out <script> tags, but it fails to remove dangerous event-handler attributes like onerror in other HTML tags such as <img>. This incomplete sanitization allows an authenticated attacker to inject malicious web scripts or HTML via the body parameter in a POST request.'}, {'type': 'paragraph', 'content': "When this malicious content is later displayed, it executes arbitrary JavaScript in the victim's browser, potentially leading to harmful actions such as session theft or privilege escalation."}] [1]
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': "This vulnerability can allow an authenticated remote attacker to inject and execute arbitrary JavaScript code in the context of other users' browsers when they view the malicious content."}, {'type': 'list_item', 'content': 'Session theft: Attackers can steal session cookies, potentially hijacking user sessions.'}, {'type': 'list_item', 'content': "Privilege escalation: Depending on the victim's privileges, attackers might perform actions on their behalf."}, {'type': 'list_item', 'content': 'Compromise of user data and integrity of the application.'}] [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring POST requests to the /user/release.html endpoint, specifically looking for the presence of suspicious or crafted content in the body parameter that includes event-handler attributes such as onerror within HTML tags.'}, {'type': 'paragraph', 'content': 'Since the vulnerability requires authentication, detection involves checking authenticated user activity for unusual or unexpected input containing HTML with event handlers.'}, {'type': 'paragraph', 'content': "A possible command to detect attempts could be using web server logs or network traffic inspection tools to filter POST requests to /user/release.html containing the body parameter with suspicious patterns like 'onerror=' or other event handlers."}, {'type': 'list_item', 'content': "Example using grep on web server logs: grep -i 'POST /user/release.html' access.log | grep -i 'body=.*onerror='"}, {'type': 'list_item', 'content': 'Using a network capture tool like tcpdump or Wireshark to filter HTTP POST requests to /user/release.html and inspect the body parameter for event-handler attributes.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting or monitoring authenticated user input to the /user/release.html endpoint, especially the body parameter, to prevent injection of malicious event-handler attributes.
Applying input validation and sanitization that properly removes or neutralizes all dangerous HTML event handlers, not just <script> tags, is critical.
If possible, update JiZhiCMS to a version later than 2.5.6 where this vulnerability is fixed.
As a temporary workaround, consider restricting access to the vulnerable endpoint to trusted users only and monitoring logs for suspicious activity.