Vulnerability Description
Mantis Bug Tracker (MantisBT) is an open source issue tracker. In version 2.28.0, when deleting a Tag (tag_delete.php), improper escaping of its name when displaying the confirmation message allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript. Version 2.28.1 fixes the issue. Workarounds include reverting commit d6890320752ecf37bd74d11fe14fe7dc12335be9 and/or manually editing language files to remove the sprintf placeholder `%1$s` from `$s_tag_delete_message` string.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mantisbt | Mantisbt | 2.28.0 |
Related Weaknesses (CWE)
References
- https://github.com/mantisbt/mantisbt/commit/80990f43153167c73f11eb4b2bc7108d0c3dPatch
- https://github.com/mantisbt/mantisbt/commit/d6890320752ecf37bd74d11fe14fe7dc1233Patch
- https://github.com/mantisbt/mantisbt/security/advisories/GHSA-fh48-f69w-7vmpPatchVendor AdvisoryMitigation
FAQ
What is CVE-2026-33517?
CVE-2026-33517 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Mantis Bug Tracker (MantisBT) is an open source issue tracker. In version 2.28.0, when deleting a Tag (tag_delete.php), improper escaping of its name when displaying the confirmation message allows an...
How severe is CVE-2026-33517?
CVE-2026-33517 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33517?
Check the references section above for vendor advisories and patch information. Affected products include: Mantisbt Mantisbt.