Home

Description

Isso is a lightweight commenting server written in Python and JavaScript. In commits before 0afbfe0691ee237963e8fb0b2ee01c9e55ca2144, there is a stored Cross-Site Scripting (XSS) vulnerability affecting the website and author comment fields. The website field was HTML-escaped using quote=False, which left single and double quotes unescaped. Since the frontend inserts the website value directly into a single-quoted href attribute via string concatenation, a single quote in the URL breaks out of the attribute context, allowing injection of arbitrary event handlers (e.g. onmouseover, onclick). The same escaping is missing entirely from the user-facing comment edit endpoint (PUT /id/) and the moderation edit endpoint (POST /id//edit/). This issue has been patched in commit 0afbfe0691ee237963e8fb0b2ee01c9e55ca2144. To workaround, nabling comment moderation (moderation = enabled = true in isso.cfg) prevents unauthenticated users from publishing comments, raising the bar for exploitation, but it does not fully mitigate the issue since a moderator activating a malicious comment would still expose visitors.

PUBLISHED Reserved 2026-02-19 | Published 2026-02-21 | Updated 2026-02-24 | Assigner GitHub_M




MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-116: Improper Encoding or Escaping of Output

Product status

< 0afbfe0691ee237963e8fb0b2ee01c9e55ca2144
affected

References

github.com/...s/isso/security/advisories/GHSA-9fww-8cpr-q66r

github.com/...ommit/0afbfe0691ee237963e8fb0b2ee01c9e55ca2144

docs.python.org/3/library/html.html

cve.org (CVE-2026-27469)

nvd.nist.gov (CVE-2026-27469)

Download JSON