CVE-2026-32986 PUBLISHED

Textpattern CMS 4.9.0: Second-Order XSS via Atom Feed Injection

Assigner: VulnCheck
Reserved: 17.03.2026 Published: 20.03.2026 Updated: 20.03.2026

A Second-Order Cross-Site Scripting (XSS) vulnerability exists in Textpattern CMS version 4.9.0 due to improper sanitization and contextual encoding of user-supplied input embedded within Atom feed XML elements. User-controlled parameters (e.g., category) are reflected into Atom fields such as <id> and <link href> without proper XML escaping. While the payload may not execute directly in modern browsers in raw XML context, it can execute when the feed is consumed by HTML-based feed readers, admin dashboards, or CMS aggregators that insert the feed content into the DOM using unsafe methods (e.g., innerHTML), resulting in JavaScript execution in a trusted context.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 5.1

Product Status

Vendor Textpattern
Product Textpattern CMS
Versions Default: unaffected
  • Version 4.9.0 is affected

Credits

  • indoushka finder

References

Problem Types

  • CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE
  • CWE-116 Improper Encoding or Escaping of Output CWE