CVE-2026-31153
Stored XSS in Bynder v0.1.394 Enables Arbitrary Script Execution
Publication date: 2026-04-06
Last updated on: 2026-04-06
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| bynder | bynder | 0.1.394 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate the stored cross-site scripting (XSS) vulnerability in Bynder v0.1.394, immediate steps include avoiding interaction with untrusted collection names and being cautious when hovering over collection names in the dashboard, as this can trigger malicious scripts.
Additionally, restrict user privileges to limit the ability to create collections with malicious payloads, and consider applying input validation or sanitization on collection names to prevent injection of scripts.
Monitoring for updates or patches from Bynder and applying them as soon as they become available is also recommended.
Can you explain this vulnerability to me?
CVE-2026-31153 is a stored cross-site scripting (XSS) vulnerability found in Bynder version 0.1.394.
This vulnerability allows attackers to execute arbitrary web scripts or HTML by injecting a crafted payload into the application.
An attacker can log into the application, navigate to the collections section, and create a new collection with a name containing an XSS payload.
When a user later visits the dashboard and searches for this collection, hovering the mouse over the collection name triggers the execution of the malicious script, causing an XSS popup.
How can this vulnerability impact me? :
This stored XSS vulnerability can allow attackers to execute arbitrary scripts in the context of the affected application.
Such execution can lead to theft of user session tokens, defacement, redirection to malicious sites, or other malicious actions performed on behalf of the user.
Users interacting with the affected collections may unknowingly trigger the malicious scripts, compromising their security and privacy.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This stored cross-site scripting (XSS) vulnerability in Bynder v0.1.394 can be detected by attempting to inject a crafted payload into the application and observing if it executes. Specifically, an attacker can log into the application, navigate to the collections section, and create a new collection with a name containing an XSS payload such as `SXSS ""><img src=x onmouseover=alert(document.domain)>`.
Detection involves verifying if the payload executes when a user visits the dashboard and interacts with the collection name, for example by hovering the mouse over it, which triggers the malicious script.
There are no specific network or system commands provided to detect this vulnerability automatically.