Description
Mantis Bug Tracker (MantisBT) is an open source issue tracker. In versions 2.28.1 and below, improper escaping of the redirection page (retrieved from the request's Referer header) allows an attacker to inject HTML. While this is generally not directly actionable as modern browsers will URL-encode special characters, on some specific server configurations this could poison the cache, leading to cross-site scripting. This issue has been fixed in version 2.28.2.
Published: 2026-05-22
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability exists in Mantis Bug Tracker versions 2.28.1 and earlier, where the application uses the Referer header value directly to build a redirect URL without proper escaping. This flaw permits an attacker to inject arbitrary HTML into the response. Although modern browsers typically encode special characters in the Referer header, certain server configurations may still apply the raw value, potentially causing cache poisoning and enabling reflected XSS attacks. A successful exploitation could allow an attacker to execute scripts in the context of a logged‑in user, leading to theft of authentication cookies, session hijacking, or defacement of the site. The weakness is classified as a typical reflected XSS flaw (CWE‑79).

Affected Systems

The affected product is Mantis Bug Tracker, provided by the mantisbt vendor. Only versions 2.28.1 and earlier are vulnerable; the issue was addressed in release 2.28.2. System administrators running any of the old releases must verify versions and plan an upgrade.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate severity. The EPSS score is not available, suggesting no current statistical data on exploitation likelihood, and the vulnerability is not listed in the CISA KEV catalog. Likely attack vectors involve an attacker crafting an HTTP request with a malicious Referer header targeting the tag update endpoint. If the server environment allows the raw Referer header to be reflected unescaped, exploitation will be straightforward; otherwise, the attack may be limited by browser encoding behavior. Provided the vulnerability is still present, organizations should treat it as moderate to high risk depending on their exposure to external requests.

Generated by OpenCVE AI on May 22, 2026 at 21:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Mantis Bug Tracker to version 2.28.2 or later to eliminate the improper escaping flaw.
  • Configure the web server or application to escape or strip the Referer header before using it in redirect URLs, ensuring no raw header value reaches the browser.
  • Deploy a web application firewall rule or policy that blocks suspicious or malformed Referer header content to prevent injection attempts.

Generated by OpenCVE AI on May 22, 2026 at 21:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6jh4-47v2-4g37 MantisBT has Potential Referer-Based Reflected HTML Injection / XSS in Tag Update Page
History

Sat, 23 May 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Mantisbt
Mantisbt mantisbt
Vendors & Products Mantisbt
Mantisbt mantisbt

Fri, 22 May 2026 20:00:00 +0000

Type Values Removed Values Added
Description Mantis Bug Tracker (MantisBT) is an open source issue tracker. In versions 2.28.1 and below, improper escaping of the redirection page (retrieved from the request's Referer header) allows an attacker to inject HTML. While this is generally not directly actionable as modern browsers will URL-encode special characters, on some specific server configurations this could poison the cache, leading to cross-site scripting. This issue has been fixed in version 2.28.2.
Title MantisBT has Potential Referer-Based Reflected HTML Injection / XSS in Tag Update Page
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Mantisbt Mantisbt
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-23T02:41:23.021Z

Reserved: 2026-04-14T14:07:59.641Z

Link: CVE-2026-40598

cve-icon Vulnrichment

Updated: 2026-05-23T02:41:17.264Z

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T22:00:12Z

Weaknesses