Home

Description

Admidio is an open-source user management solution. Prior to version 5.0.9, an unauthenticated attacker can execute arbitrary JavaScript in any Admidio user's browser through a reflected XSS in system/msg_window.php. The endpoint passes user input through htmlspecialchars(), which does not encode square brackets. A subsequent call to Language::prepareTextPlaceholders() converts those brackets into HTML angle brackets, producing executable markup. This issue has been patched in version 5.0.9.

PUBLISHED Reserved 2026-04-21 | Published 2026-05-07 | Updated 2026-05-07 | Assigner GitHub_M




MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 5.0.9
affected

References

github.com/...dmidio/security/advisories/GHSA-gq27-fc8w-vcmp exploit

github.com/...dmidio/security/advisories/GHSA-gq27-fc8w-vcmp

github.com/Admidio/admidio/releases/tag/v5.0.9

cve.org (CVE-2026-41661)

nvd.nist.gov (CVE-2026-41661)

Download JSON