CVE-2026-2276 PUBLISHED

Reflected Cross-Site Scripting in the Wix web application

Assigner: INCIBE
Reserved: 10.02.2026 Published: 12.02.2026 Updated: 12.02.2026

Reflected Cross-Site Scripting (XSS) vulnerability in the Wix web application, where the endpoint ' https://manage.wix.com/account/account-settings ', responsible for uploading SVG images, does not properly sanitize the content. An authenticated attacker could upload an SVG file containing embedded JavaScript code, which is stored and subsequently executed when other users view the image. Exploiting this vulnerability allows arbitrary code to be executed in the context of the victim's browser, which could lead to the disclosure of sensitive information or the abuse of the affected user's session.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 5.3

Product Status

Vendor https://www.lavanguardia.com/vida/20260212/11464294/webs-grupo-godo-sufren-ciberataque.html
Product web application
Versions Default: unaffected
  • Version All versions is affected

Solutions

No solution has been reported at this time.

Credits

  • Miguel Jiménez Cámara finder

References

Problem Types

  • CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') CWE