CVE-2026-36761
Received Received - Intake
Stored XSS in JeeSite v5.15.1

Publication date: 2026-04-30

Last updated on: 2026-04-30

Assigner: MITRE

Description
A stored cross-site scripting (XSS) vulnerability in the /msg/msgInner/save endpoint of JeeSite v5.15.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted input into the msgContent parameter.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-30
Last Modified
2026-04-30
Generated
2026-05-07
AI Q&A
2026-04-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
thinkgem jeesite to 5.15.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a stored cross-site scripting (XSS) issue in JeeSite version 5.15.1 and earlier, specifically in the msgContent parameter of the /a/msg/msgInner/save endpoint.

Attackers with message-sending permissions can inject malicious scripts or HTML payloads into messages sent to higher-privileged users. When the recipient views the message, the frontend renders the content unsafely using Vue's v-html directive, which executes the injected payload in the victim's browser.

The root cause includes an insufficient server-side regex-based XSS filter that fails to block many dangerous HTML tags and attributes, and unsafe frontend rendering that allows execution of arbitrary HTML and scripts.

This vulnerability can be exploited through various bypass techniques such as incomplete tag blacklists, lack of protocol checks, HTML entity encoding bypasses, and special HTML prefixes that preserve malicious content.


How can this vulnerability impact me? :

Exploitation of this vulnerability can lead to several serious security impacts including arbitrary API execution, session hijacking, and privilege escalation.

An attacker can execute malicious scripts in the context of the victim's browser session, potentially stealing sensitive information, performing unauthorized actions, or escalating their privileges within the application.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the /a/msg/msgInner/save endpoint for stored cross-site scripting (XSS) via the msgContent parameter. Specifically, you can attempt to inject crafted XSS payloads into the msgContent field and then verify if these payloads are executed when viewing messages through the /a/msg/msgInner/view endpoint.

Detection commands or methods could include using tools like curl or Burp Suite to send crafted HTTP POST requests to the vulnerable endpoint with XSS payloads in the msgContent parameter, then checking if the payload executes in the recipient's browser.

  • Example curl command to test injection:
  • curl -X POST 'http://target-site/a/msg/msgInner/save' -d 'msgContent=<script>alert(1)</script>' -H 'Content-Type: application/x-www-form-urlencoded'
  • After sending the payload, log in as the recipient user and access the /a/msg/msgInner/view endpoint to see if the alert or script executes.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include sanitizing user input on both server and client sides to prevent malicious scripts from being stored and executed.

Short-term fixes recommended are:

  • Integrate DOMPurify or a similar frontend sanitizer to clean user content before rendering it with Vue's v-html directive.
  • Expand the server-side blacklist of HTML tags and attributes and add protocol checks to block dangerous inputs more effectively.

Long-term solutions involve replacing the current regex-based server-side filtering with a robust HTML sanitizer such as OWASP Java HTML Sanitizer or jsoup Cleaner, which parse HTML into a DOM tree and apply whitelist-based filtering to prevent bypasses.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The stored cross-site scripting (XSS) vulnerability in JeeSite v5.15.1 allows attackers to execute arbitrary scripts in the context of a victim's browser session, potentially leading to session hijacking, privilege escalation, and unauthorized access to sensitive data.

Such unauthorized access and data exposure can negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive information against unauthorized access and breaches.

Specifically, the vulnerability could lead to data confidentiality and integrity issues, which are critical compliance requirements under these regulations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart