changedetection.io is a free open source web page change detection tool. Prior to version 0.54.4, there is a reflected cross-site scripting (XSS) vulnerability identified in the /rss/tag/ endpoint of changedetection.io. The tag_uuid path parameter is reflected directly in the HTTP response body without HTML escaping. Since Flask returns text/html by default for plain string responses, the browser parses and executes injected JavaScript. This issue has been patched in version 0.54.4.
References
| Link | Resource |
|---|---|
| https://github.com/dgtlmoon/changedetection.io/commit/ec7d56f85d1e9690fca7cb4711c1fb20dffec780 | Patch |
| https://github.com/dgtlmoon/changedetection.io/releases/tag/0.54.4 | Product Release Notes |
| https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-8whx-v8qq-pq64 | Exploit Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-06 07:16
Updated : 2026-03-10 19:38
NVD link : CVE-2026-29038
Mitre link : CVE-2026-29038
CVE.ORG link : CVE-2026-29038
JSON object : View
Products Affected
webtechnologies
- changedetection
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
