Description
Movable Type contains a stored cross-site scripting vulnerability in Export Sites. If crafted input is stored by an attacker, arbitrary script may be executed on a logged-in user's web browser. Note that Movable Type 7 series and 8.4 series, which are End-of-Life (EOL), are affected by the vulnerability as well.
Published: 2026-02-04
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored XSS leading to arbitrary script execution on logged‑in users’ browsers
Action: Upgrade
AI Analysis

Impact

Movable Type contains a stored cross‑site scripting flaw in the Export Sites feature. If an attacker supplies crafted data that is stored by the system, the malicious script will run whenever a logged‑in user views the exported content. The known weakness is identified as CWE‑79, which permits attackers to inject client‑side code that compromises confidentiality and integrity of the victim’s browser session.

Affected Systems

The affected products are Six Apart’s Movable Type editions: Cloud Edition, Software Edition, Advanced, Premium (Advanced Edition), Premium (Cloud Edition), and Premium (Software Edition). Versions 7.x and 8.4.x, which are end‑of‑life, also are susceptible. Specific version numbers are not listed in the available data.

Risk and Exploitability

The CVSS score of 4.8 indicates a moderate severity. Exploitation probability, per EPSS, is less than 1 %, suggesting a low likelihood of widespread attacks. The issue is not present in CISA’s Known Exploited Vulnerabilities catalog. Based on the description, the likely attack vector is through the web interface that handles Export Sites, where an attacker must create or modify content that is later rendered to other users’ browsers. No public exploitation has been reported, and the exploitation conditions require authorized access to the export functionality or the ability to inject content that is subsequently displayed.

Generated by OpenCVE AI on April 18, 2026 at 14:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a vendor‑issued patch or upgrade to a fixed version of Movable Type, as provided by Six Apart in their advisories.
  • If upgrading is not immediately possible, restrict the Export Sites feature to trusted administrators and apply input validation to sanitize any user‑supplied text before storage.
  • Continuously monitor the application for XSS attempts, and consider disabling the Export Sites function if it is not needed for business operations.

Generated by OpenCVE AI on April 18, 2026 at 14:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title Stored Cross‑Site Scripting in Export Sites

Wed, 04 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Six Apart
Six Apart movable Type
Six Apart Ltd
Six Apart Ltd movable Type
Vendors & Products Six Apart
Six Apart movable Type
Six Apart Ltd
Six Apart Ltd movable Type

Wed, 04 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 07:15:00 +0000

Type Values Removed Values Added
Description Movable Type contains a stored cross-site scripting vulnerability in Export Sites. If crafted input is stored by an attacker, arbitrary script may be executed on a logged-in user's web browser. Note that Movable Type 7 series and 8.4 series, which are End-of-Life (EOL), are affected by the vulnerability as well.
Weaknesses CWE-79
References
Metrics cvssV3_0

{'score': 5.4, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Six Apart Movable Type
Six Apart Ltd Movable Type
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-02-04T16:08:00.768Z

Reserved: 2026-01-29T02:02:30.407Z

Link: CVE-2026-22875

cve-icon Vulnrichment

Updated: 2026-02-04T16:07:55.544Z

cve-icon NVD

Status : Deferred

Published: 2026-02-04T07:16:01.213

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-22875

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:15:04Z

Weaknesses