Home

Description

Bludit version 3.16.2 contains a stored cross-site scripting (XSS) vulnerability in the post content functionality. The application performs client-side sanitation of content input but does not enforce equivalent sanitation on the server side. An authenticated user can inject arbitrary JavaScript into the content field of a post, which is stored and later rendered to other users without proper output encoding. When viewed, the injected script executes in the context of the victim’s browser, allowing session hijacking, credential theft, content manipulation, or other actions within the user’s privileges.

PUBLISHED Reserved 2026-02-23 | Published 2026-02-23 | Updated 2026-02-23 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

Product status

Default status
unknown

Any version
affected

Credits

Catalin Iovita (@catalin-iovita) finder

Beatriz Fresno Naumova finder

References

github.com/bludit/bludit/issues/1579 issue-tracking

www.vulncheck.com/...ories/bludit-stored-xss-in-post-content third-party-advisory

cve.org (CVE-2026-27742)

nvd.nist.gov (CVE-2026-27742)

Download JSON