Skip to content

Commit 816ea58

Browse files
flavorjonesRubySec CI
authored andcommitted
Updated advisory posts against rubysec/ruby-advisory-db@bb1ce69
1 parent 8251f08 commit 816ea58

1 file changed

Lines changed: 50 additions & 0 deletions

File tree

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2026-23891 (decidim-core): Decidim has a cross-site scripting (XSS) in
4+
user name'
5+
comments: false
6+
categories:
7+
- decidim-core
8+
advisory:
9+
gem: decidim-core
10+
cve: 2026-23891
11+
ghsa: fc46-r95f-hq7g
12+
url: https://github.com/decidim/decidim/security/advisories/GHSA-fc46-r95f-hq7g
13+
title: Decidim has a cross-site scripting (XSS) in user name
14+
date: 2026-04-13
15+
description: |-
16+
### Impact
17+
18+
A stored code execution vulnerability in the user name field allows
19+
a low-privileged attacker to execute arbitrary code in the context
20+
of any user who passively visits a comment page, resulting in high
21+
confidentiality and integrity impact across security boundaries.
22+
23+
### Patches
24+
25+
N/A
26+
27+
### Workarounds
28+
29+
Not available
30+
31+
### References
32+
33+
OWASP ASVS v4.0.3-5.1.3
34+
35+
### Credits
36+
37+
This issue was discovered in a security audit organized by
38+
[octree](https://octree.ch/) and made by
39+
[Secu Labs](https://seculabs.ch/) against Decidim financed
40+
by the city of Lausanne (Switzerland).
41+
patched_versions:
42+
- "~> 0.30.5"
43+
- ">= 0.31.1"
44+
related:
45+
url:
46+
- https://github.com/decidim/decidim/releases/tag/v0.31.1
47+
- https://github.com/decidim/decidim/releases/tag/v0.30.5
48+
- https://github.com/decidim/decidim/security/advisories/GHSA-fc46-r95f-hq7g
49+
- https://github.com/advisories/GHSA-fc46-r95f-hq7g
50+
---

0 commit comments

Comments
 (0)