Skip to content

Stored Cross-Site Scripting (XSS) in GroupEditor.php

Moderate
DawoudIO published GHSA-3wp4-vpr7-47q6 Feb 16, 2026

Package

GroupEditor.php

Affected versions

6.8.0

Patched versions

6.8.1

Description

Summary

It was possible for an authenticated user with permission to edit groups to store a JavaScript payload that would execute when the group was viewed in the Group View.

Details

An authenticated user with permission to edit groups could create a new role within a group. While the initial role name was properly sanitized, renaming the group to a JavaScript payload allowed the payload to be successfully uploaded and executed.

PoC

As an authenticated user, visit /GroupList.php, add a new group.

image

Scroll down to Group Roles, add a New Role with any name.

image

Click the roles name to edit it, change the name to "><script>alert(window.location)</script>

image

Refresh the page, observe the payload execute.

image

Impact

The payload is executed anytime the group is viewed in the group viewer, additionally the authentication cookie has its Secure and HttpOnly flags set to false by default, which would allow for account takeover.

image

Severity

Moderate

CVE ID

CVE-2026-26059

Weaknesses

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. Learn more on MITRE.

Credits