Vulnerability Description
Reflected Cross-Site Scripting (XSS) vulnerability in the Wix web application, where the endpoint ' https://manage.wix.com/account/account-settings ', responsible for uploading SVG images, does not properly sanitize the content. An authenticated attacker could upload an SVG file containing embedded JavaScript code, which is stored and subsequently executed when other users view the image. Exploiting this vulnerability allows arbitrary code to be executed in the context of the victim's browser, which could lead to the disclosure of sensitive information or the abuse of the affected user's session.
Related Weaknesses (CWE)
References
FAQ
What is CVE-2026-2276?
CVE-2026-2276 is a documented vulnerability. Reflected Cross-Site Scripting (XSS) vulnerability in the Wix web application, where the endpoint ' https://manage.wix.com/account/account-settings ', responsible for uploading SVG images, does not pr...
How severe is CVE-2026-2276?
CVSS scoring is not yet available for CVE-2026-2276. Check NVD for updates.
Is there a patch for CVE-2026-2276?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.