← Retour aux CVEs
CVE-2026-41466
MEDIUM5.4
Description
ProjeQtor versions 7.0 through 12.4.3 contain a stored cross-site scripting vulnerability in the checkValidHtmlText() function within Security.php that fails to properly sanitize user input by only detecting specific patterns while returning unsanitized strings without output encoding. Attackers can inject malicious payloads that bypass the filter using alternative syntax such as img tags with event handlers, which are stored and executed in the browsers of users viewing the affected content.
Details CVE
Score CVSS v3.15.4
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurREQUIRED
Publie4/27/2026
Derniere modification4/27/2026
Sourcenvd
Observations honeypot0
Faiblesses (CWE)
CWE-79
References
https://damiri.fr/en/cves/CVE-2026-41466(disclosure@vulncheck.com)
https://gryfman.fr/cves/CVE-2026-41466(disclosure@vulncheck.com)
https://www.projeqtor.com(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/projeqtor-stored-xss-via-checkvalidhtmltext(disclosure@vulncheck.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.