Vulnerability Description
Mantis Bug Tracker (MantisBT) is an open source issue tracker. In version 2.28.0, improper escaping of tag names retrieved from History in Timeline (my_view_page.php) allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript, when displaying a tag that has been renamed or deleted. Version 2.28.1 contains a patch. Workarounds include editing offending History entries (using SQL) and wrapping `$this->tag_name` in a string_html_specialchars() call in IssueTagTimelineEvent::html().
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mantisbt | Mantisbt | 2.28.0 |
Related Weaknesses (CWE)
References
- https://github.com/mantisbt/mantisbt/commit/f32787c14d4518476fe7f05f992dbfe6eaccPatch
- https://github.com/mantisbt/mantisbt/security/advisories/GHSA-73vx-49mv-v8w5PatchVendor Advisory
FAQ
What is CVE-2026-33548?
CVE-2026-33548 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Mantis Bug Tracker (MantisBT) is an open source issue tracker. In version 2.28.0, improper escaping of tag names retrieved from History in Timeline (my_view_page.php) allows an attacker to inject HTML...
How severe is CVE-2026-33548?
CVE-2026-33548 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33548?
Check the references section above for vendor advisories and patch information. Affected products include: Mantisbt Mantisbt.