Description
A security vulnerability has been detected in DbGate up to 7.1.4. This affects an unknown function of the file packages/web/src/icons/FontIcon.svelte of the component SVG Icon String Handler. Such manipulation of the argument applicationIcon leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 7.1.5 mitigates this issue. It is advisable to upgrade the affected component.
Published: 2026-04-13
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (XSS) enabling remote script execution in users’ browsers
Action: Immediate Patch
AI Analysis

Impact

A browser‑based XSS vulnerability exists in the SVG Icon String Handler of the DbGate web client. Attackers can supply a crafted value for the argument applicationIcon, which is then embedded directly into an SVG element without proper sanitization. This flaw permits arbitrary scripts to run in the context of an authenticated or unauthenticated user navigating the affected interface, potentially leading to session hijacking, data theft, or further manipulation of the target web page. The vulnerability falls under CWE‑79 (XSS) and also connects to CWE‑94 (Code Injection) because the injected payload may involve execution of unexpected code.

Affected Systems

DbGate versions up to 7.1.4 are vulnerable. The flaw resides in the web component packaged in the source file packages/web/src/icons/FontIcon.svelte. Any environment hosting these versions of DbGate, including private deployments, is susceptible until an update is installed.

Risk and Exploitability

The published CVSS score of 5.1 indicates a moderate risk level. While no EPSS score is available, the vulnerability has been disclosed publicly and can be triggered from a remote location without any local privileges. Because the flaw is an XSS, it typically requires a victim to visit the affected page or for the attacker to coerce one, but once achieved, the impact can be significant. The vulnerability is not listed in the CISA KEV catalog, and no automated exploit tools were reported at the time of disclosure. Nonetheless, the availability of a public exploit and the remote nature mean that organizations should treat this as a high‑priority issue.

Generated by OpenCVE AI on April 13, 2026 at 21:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade DbGate to version 7.1.5 or later
  • If upgrade is not immediately possible, restrict or disable the UI component that utilizes FontIcon.svelte
  • Apply strict input sanitization to the applicationIcon parameter before it is embedded in the SVG output
  • Enforce a strong Content Security Policy to limit execution of injected scripts

Generated by OpenCVE AI on April 13, 2026 at 21:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-j8j5-7r4h-vj2g DbGate has cross site scripting via the SVG Icon String Handler component
History

Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Dbgate
Dbgate dbgate
Vendors & Products Dbgate
Dbgate dbgate

Tue, 14 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in DbGate up to 7.1.4. This affects an unknown function of the file packages/web/src/icons/FontIcon.svelte of the component SVG Icon String Handler. Such manipulation of the argument applicationIcon leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 7.1.5 mitigates this issue. It is advisable to upgrade the affected component.
Title DbGate SVG Icon String FontIcon.svelte cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-14T15:41:52.694Z

Reserved: 2026-04-13T13:18:23.612Z

Link: CVE-2026-6216

cve-icon Vulnrichment

Updated: 2026-04-14T15:41:47.109Z

cve-icon NVD

Status : Deferred

Published: 2026-04-13T21:16:32.003

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-6216

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:33:24Z

Weaknesses