Description
Webmin before 2.641 contains a stored cross-site scripting vulnerability in the email template description field of the System and Server Status module that allows low-privileged authenticated attackers to execute arbitrary commands by injecting unsanitized input stored in save_tmpl.cgi and rendered unescaped in list_tmpls.cgi.
Published: 2026-05-21
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Webmin before version 2.641 contains a stored cross‑site scripting vulnerability in the email template description field of the System and Server Status module. Unsanitized input supplied by an authenticated user is persisted through save_tmpl.cgi and later rendered without escaping in list_tmpls.cgi, enabling the attacker to inject malicious code that can execute arbitrary commands on the host.

Affected Systems

Any Webmin installation running a version older than 2.641 is affected. The vulnerability resides in the System and Server Status module’s email template description field and applies to all vendors’ Webmin packages.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog. The attack requires authenticated access with low privileges; once an attacker injects malicious content, it persists and can be executed when the template is rendered, posing a significant threat in environments where users have such access.

Generated by OpenCVE AI on May 21, 2026 at 22:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Webmin to version 2.641 or later to eliminate the vulnerability.
  • Restrict or remove access to the System and Server Status module for low‑privileged accounts, or disable the email template feature if it is not required.
  • If an upgrade is not immediately possible, audit and sanitize the email template description field to strip or encode script content and monitor for suspicious activity.

Generated by OpenCVE AI on May 21, 2026 at 22:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Webmin
Webmin webmin
Vendors & Products Webmin
Webmin webmin

Thu, 21 May 2026 21:45:00 +0000

Type Values Removed Values Added
Description Webmin before 2.641 contains a stored cross-site scripting vulnerability in the email template description field of the System and Server Status module that allows low-privileged authenticated attackers to execute arbitrary commands by injecting unsanitized input stored in save_tmpl.cgi and rendered unescaped in list_tmpls.cgi.
Title Webmin < 2.641 Stored XSS via System and Server Status
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-21T21:00:43.413Z

Reserved: 2026-01-08T19:04:26.365Z

Link: CVE-2026-22678

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-21T22:16:46.970

Modified: 2026-05-21T22:16:46.970

Link: CVE-2026-22678

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T22:30:20Z

Weaknesses