Description
A security vulnerability has been detected in rymcu forest up to 0.0.5. Affected by this issue is the function XssUtils.replaceHtmlCode of the file src/main/java/com/rymcu/forest/util/XssUtils.java of the component Article Content/Comments/Portfolio. The manipulation leads to cross site scripting. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-22
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Mitigate
AI Analysis

Impact

The vulnerability resides in the XssUtils.replaceHtmlCode method of the rymcu forest Article Content/Comments/Portfolio component. The method is intended to strip or replace HTML code but fails to properly escape user supplied content, allowing malicious scripts to be injected into rendered pages. An attacker can insert arbitrary JavaScript or other executable content that will run in the browsers of any user who views the affected page. This flaw is a classic cross‑site scripting vulnerability and could be used to hijack user sessions, steal cookies, or deface content.

Affected Systems

Affected product is rymcu forest, versions up to 0.0.5. The issue is present in the src/main/java/com/rymcu/forest/util/XssUtils.java file of the Article Content/Comments/Portfolio module. No later version information is provided in the CNA data, so any instance running 0.0.5 or earlier is potentially vulnerable.

Risk and Exploitability

The CVSS score is 5.1, indicating moderate severity. EPSS shows less than 1% probability of exploitation, and the vulnerability is not in CISA's KEV catalogue. Based on the description, the attack vector is remote and originates from user‑supplied content that is processed by replaceHtmlCode. If exploited, the attacker could execute arbitrary scripts in the victim’s browser, compromising confidentiality and integrity of user data. The low EPSS suggests that publicly available exploits are not common yet, but the presence of a publicly disclosed proof‑of‑concept means the risk remains.

Generated by OpenCVE AI on April 17, 2026 at 16:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to a patched or newer version of rymcu forest that removes the unsafe XssUtils.replaceHtmlCode implementation, if one is available.
  • For existing installations, modify the Article Content/Comments/Portfolio component to sanitize input by escaping HTML entities before storing or rendering, or by disabling XssUtils.replaceHtmlCode for untrusted data.
  • Deploy a Content Security Policy that restricts inline scripts and external script sources to mitigate the impact of any still‑susceptible XSS vectors.
  • Add strict authentication and authorization checks to the content submission interface to ensure only trusted users can submit content that could contain malicious code.

Generated by OpenCVE AI on April 17, 2026 at 16:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 22 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in rymcu forest up to 0.0.5. Affected by this issue is the function XssUtils.replaceHtmlCode of the file src/main/java/com/rymcu/forest/util/XssUtils.java of the component Article Content/Comments/Portfolio. The manipulation leads to cross site scripting. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title rymcu forest Article Content/Comments/Portfolio XssUtils.java XssUtils.replaceHtmlCode cross site scripting
First Time appeared Rymcu
Rymcu forest
Weaknesses CWE-79
CWE-94
CPEs cpe:2.3:a:rymcu:forest:*:*:*:*:*:*:*:*
Vendors & Products Rymcu
Rymcu forest
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-25T16:27:02.851Z

Reserved: 2026-02-21T17:42:03.493Z

Link: CVE-2026-2946

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-02-22T13:16:13.323

Modified: 2026-02-25T18:34:04.853

Link: CVE-2026-2946

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:45:15Z

Weaknesses