Home

Description

Decidim is a participatory democracy framework. In versions below 0.30.5 and 0.31.0.rc1 through 0.31.0, a stored code execution vulnerability in the user name field allows a low-privileged attacker to execute arbitrary code in the context of any user who passively visits a comment page, resulting in high confidentiality and integrity impact across security boundaries. This issue has been fixed in versions 0.30.5 and 0.31.1.

PUBLISHED Reserved 2026-01-16 | Published 2026-04-13 | Updated 2026-04-13 | Assigner GitHub_M




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

>= 0.31.0.rc1, < 0.31.1
affected

< 0.30.5
affected

References

github.com/...ecidim/security/advisories/GHSA-fc46-r95f-hq7g

github.com/decidim/decidim/releases/tag/v0.30.5

github.com/decidim/decidim/releases/tag/v0.31.1

cve.org (CVE-2026-23891)

nvd.nist.gov (CVE-2026-23891)

Download JSON