Description
Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.
Published: 2026-01-23
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected XSS via the login error page
Action: Patch Update
AI Analysis

Impact

A reflected Cross‑Site Scripting flaw allows an attacker to inject and execute arbitrary JavaScript when a login attempt fails, because the supplied username is echoed back without proper encoding. The impact includes theft of session cookies, defacement, or redirection of the victim to malicious sites.

Affected Systems

The vulnerability affects the Typemill flat‑file CMS from vendor Typemill. Versions 2.19.1 and older are vulnerable; the issue was remedied in release 2.19.2.

Risk and Exploitability

The CVSS score of 5.4 indicates moderate severity. EPSS shows an exploit likelihood of less than 1 %, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is that the attacker crafts a link to the login page with a malicious username that will be reflected back, or sends phishing emails prompting the victim to log in. Based on the description, the attacker can only target users who visit the vulnerable login page after a failed authentication attempt, thus requiring the victim to be prompted to enter credentials. Because it is a reflected XSS, the exploit is limited to browsers executing the injected script in the context of the login page and cannot affect other users or the server.

Generated by OpenCVE AI on April 18, 2026 at 15:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Typemill to version 2.19.2 or later to apply the vendor fix.
  • If an upgrade is delayed, modify the login error template to escape the username output (e.g., use Twig’s `{{ username|e('html') }}`) or remove the username echo entirely.
  • Limit exposure by restricting access to the login page so that only trusted users can trigger the error view.

Generated by OpenCVE AI on April 18, 2026 at 15:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Feb 2026 13:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:typemill:typemill:*:*:*:*:*:*:*:*

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Typemill
Typemill typemill
Vendors & Products Typemill
Typemill typemill

Fri, 23 Jan 2026 23:15:00 +0000

Type Values Removed Values Added
Description Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.
Title Typemill has Reflected XSS via login error view template
Weaknesses CWE-116
CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}


Subscriptions

Typemill Typemill
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-26T16:18:10.770Z

Reserved: 2026-01-21T18:38:22.473Z

Link: CVE-2026-24127

cve-icon Vulnrichment

Updated: 2026-01-26T16:14:38.702Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-23T23:15:54.360

Modified: 2026-02-02T13:32:53.560

Link: CVE-2026-24127

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T15:15:03Z

Weaknesses