← Back to CVEs
CVE-2026-28338
MEDIUM6.8
Description
PMD is an extensible multilanguage static code analyzer. Prior to version 7.22.0, PMD's `vbhtml` and `yahtml` report formats insert rule violation messages into HTML output without escaping. When PMD analyzes untrusted source code containing crafted string literals, the generated HTML report contains executable JavaScript that runs when opened in a browser. Practical impact is limited because `vbhtml` and `yahtml` are legacy formats rarely used in practice. The default `html` format is properly escaped and not affected. Version 7.22.0 contains a fix for the issue.
CVE Details
CVSS v3.1 Score6.8
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredNONE
User InteractionREQUIRED
Published2/27/2026
Last Modified3/3/2026
Sourcenvd
Honeypot Sightings0
Affected Products
pmd_project:pmd
Weaknesses (CWE)
CWE-79
References
https://github.com/pmd/pmd/commit/c140c0e1de5853a08efb84c9f91dfeb015882442(security-advisories@github.com)
https://github.com/pmd/pmd/pull/6475(security-advisories@github.com)
https://github.com/pmd/pmd/security/advisories/GHSA-8rr6-2qw5-pc7r(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.