Home

Description

Twenty is an open source CRM. Prior to 1.20.6, a Stored Cross-Site Scripting (XSS) vulnerability exists in the BlockNote editor component. Due to a lack of protocol validation in the FileBlock component and insufficient server-side inspection of block content, an attacker can inject a javascript: URI into the url property of a file block. This allows the execution of arbitrary JavaScript when a user clicks on the malicious file attachment. This vulnerability is fixed in 1.20.6.

PUBLISHED Reserved 2026-04-02 | Published 2026-04-21 | Updated 2026-04-21 | Assigner GitHub_M




MEDIUM: 5.7CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 1.20.6
affected

References

github.com/...twenty/security/advisories/GHSA-7w89-7q26-gj7q exploit

github.com/...twenty/security/advisories/GHSA-7w89-7q26-gj7q

github.com/...ommit/8da69e0f77ea820a6845a4c3c025b6af3861d523

cve.org (CVE-2026-35451)

nvd.nist.gov (CVE-2026-35451)

Download JSON