Description
Textpattern CMS version 4.9.0 contains a second-order cross-site scripting vulnerability that allows attackers to inject malicious scripts by exploiting improper sanitization of user-supplied input in Atom feed XML elements. Attackers can embed unescaped payloads in parameters such as category that are reflected into Atom fields like and , which execute as JavaScript when feed readers or CMS aggregators consume the feed and insert content into the DOM using unsafe methods.
Published: 2026-03-20
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Second‑Order Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

Textpattern CMS version 4.9.0 contains a second‑order cross‑site scripting vulnerability that allows attackers to inject malicious scripts by exploiting improper sanitization of user‑supplied input in Atom feed XML elements. Unescaped payloads can be embedded in parameters such as category, which are later reflected into Atom fields that are rendered by feed readers or CMS aggregators. When clients process these feeds and insert the content into the DOM using unsafe methods, the malicious JavaScript is executed, potentially compromising user accounts, stealing credentials, or delivering further malware. The weakness is a classic instance of unsanitized input with persistent context leading to client‑side script execution.

Affected Systems

The vulnerability affects Textpattern CMS, specifically the 4.9.0 release. No additional affected versions were listed in the available data. Users running this exact version should verify whether the Atom feed generation or rendering components include the vulnerable logic and consider upgrading to a later release when available.

Risk and Exploitability

The CVSS score of 5.1 places this issue in a moderate risk range, indicating that while exploitation does not grant arbitrary code execution on the server, it can cause significant client‑side damage. EPSS information is not available, so the exact likelihood of exploitation in the wild cannot be quantified. The vulnerability is not present in the CISA KEV catalog, suggesting that there are no reports of active exploitation as of now. However, because the attack can be performed remotely via crafted feed content, an attacker who can influence the feed data (for example, by creating a new category or posting through the CMS interface) could potentially exploit the flaw. The likely attack vector is remote client‑side; the prerequisite is that an external actor can inject content that will later be consumed by a third‑party feed reader or aggregator.

Generated by OpenCVE AI on March 20, 2026 at 19:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available vendor patch for Textpattern CMS 4.9.0 or later.
  • If an update is not immediately available, block external feeds that are untrusted or restrict the use of Atom feeds to internal networks only.
  • Consider sanitizing custom feed content or disabling the Category parameter in Atom feed generation until a fix is applied.
  • Monitor for any Client‑side XSS reports or automated scanners that detect the presence of injected script in the HTML of Atom feeds.

Generated by OpenCVE AI on March 20, 2026 at 19:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:textpattern:textpattern:4.9.0:-:*:*:*:*:*:*

Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Textpattern
Textpattern textpattern
Vendors & Products Textpattern
Textpattern textpattern

Fri, 20 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description A Second-Order Cross-Site Scripting (XSS) vulnerability exists in Textpattern CMS version 4.9.0 due to improper sanitization and contextual encoding of user-supplied input embedded within Atom feed XML elements. User-controlled parameters (e.g., category) are reflected into Atom fields such as <id> and <link href> without proper XML escaping. While the payload may not execute directly in modern browsers in raw XML context, it can execute when the feed is consumed by HTML-based feed readers, admin dashboards, or CMS aggregators that insert the feed content into the DOM using unsafe methods (e.g., innerHTML), resulting in JavaScript execution in a trusted context. Textpattern CMS version 4.9.0 contains a second-order cross-site scripting vulnerability that allows attackers to inject malicious scripts by exploiting improper sanitization of user-supplied input in Atom feed XML elements. Attackers can embed unescaped payloads in parameters such as category that are reflected into Atom fields like and , which execute as JavaScript when feed readers or CMS aggregators consume the feed and insert content into the DOM using unsafe methods.

Fri, 20 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description A Second-Order Cross-Site Scripting (XSS) vulnerability exists in Textpattern CMS version 4.9.0 due to improper sanitization and contextual encoding of user-supplied input embedded within Atom feed XML elements. User-controlled parameters (e.g., category) are reflected into Atom fields such as <id> and <link href> without proper XML escaping. While the payload may not execute directly in modern browsers in raw XML context, it can execute when the feed is consumed by HTML-based feed readers, admin dashboards, or CMS aggregators that insert the feed content into the DOM using unsafe methods (e.g., innerHTML), resulting in JavaScript execution in a trusted context.
Title Textpattern CMS 4.9.0: Second-Order XSS via Atom Feed Injection
Weaknesses CWE-116
CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Textpattern Textpattern
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-20T19:58:15.096Z

Reserved: 2026-03-17T11:31:56.956Z

Link: CVE-2026-32986

cve-icon Vulnrichment

Updated: 2026-03-20T19:58:10.370Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T16:16:17.573

Modified: 2026-04-16T14:44:02.620

Link: CVE-2026-32986

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:29:16Z

Weaknesses