Description
MaxKB is an open-source AI assistant for enterprise. Versions 2.7.1 and below contain an Eval Injection vulnerability in the Markdown rendering engine that allows any user capable of interacting with the AI chat interface to execute arbitrary JavaScript in the browsers of other users, including administrators, resulting in Stored Cross-Site Scripting (XSS). This issue has been fixed in version 2.8.0.
Published: 2026-04-14
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross-Site Scripting (XSS) that allows the execution of arbitrary JavaScript in the browsers of other users, including administrators
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the Markdown rendering engine of the MaxKB AI assistant, where user supplied content can be processed via eval, leading to stored XSS. Attackers can inject document modifying or malicious JavaScript that executes in the browsers of any user who views the rendered content, potentially exposing session cookies, personal data, or enabling further malicious actions. This flaw is a classic example of stored XSS (CWE-79) and eval injection (CWE‑95).

Affected Systems

MaxKB, an open‑source AI assistant for businesses, has versions 2.7.1 and earlier affected. The issue was addressed in release 2.8.0. Administrators or any user interacting with the chat interface while these vulnerable versions are in use are at risk.

Risk and Exploitability

With a CVSS score of 6.9, the vulnerability poses a moderate to high threat level. EPSS data is not available and the flaw is not listed in CISA’s KEV catalog, so current exploitation prevalence is unclear. Nonetheless, because any chat participant can embed the malicious content and the payload is stored for subsequent views, the risk is significant. Exploitation requires no privileged access beyond normal chat usage; the attacker only needs the ability to submit content that the system renders. The stored nature of the attack means subsequent victims will automatically run the malicious script without further action on their part.

Generated by OpenCVE AI on April 14, 2026 at 02:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade MaxKB to version 2.8.0 or later to eliminate the eval‑based rendering issue.

Generated by OpenCVE AI on April 14, 2026 at 02:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Maxkb
Maxkb maxkb
CPEs cpe:2.3:a:maxkb:maxkb:*:*:*:*:-:*:*:*
Vendors & Products Maxkb
Maxkb maxkb
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared 1panel
1panel maxkb
Vendors & Products 1panel
1panel maxkb

Tue, 14 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Description MaxKB is an open-source AI assistant for enterprise. Versions 2.7.1 and below contain an Eval Injection vulnerability in the Markdown rendering engine that allows any user capable of interacting with the AI chat interface to execute arbitrary JavaScript in the browsers of other users, including administrators, resulting in Stored Cross-Site Scripting (XSS). This issue has been fixed in version 2.8.0.
Title Stored XSS via Eval Injection in EchartsRander Component
Weaknesses CWE-79
CWE-95
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-14T15:55:17.386Z

Reserved: 2026-04-07T00:23:30.596Z

Link: CVE-2026-39423

cve-icon Vulnrichment

Updated: 2026-04-14T15:55:13.318Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-14T01:16:05.000

Modified: 2026-04-20T17:34:28.310

Link: CVE-2026-39423

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:31:10Z

Weaknesses