Mantis Bug Tracker (MantisBT) is an open source issue tracker. In version 2.28.0, when deleting a Tag (tag_delete.php), improper escaping of its name when displaying the confirmation message allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript. Version 2.28.1 fixes the issue. Workarounds include reverting commit d6890320752ecf37bd74d11fe14fe7dc12335be9 and/or manually editing language files to remove the sprintf placeholder `%1$s` from `$s_tag_delete_message` string.
References
| Link | Resource |
|---|---|
| https://github.com/mantisbt/mantisbt/commit/80990f43153167c73f11eb4b2bc7108d0c3d6b46 | Patch |
| https://github.com/mantisbt/mantisbt/commit/d6890320752ecf37bd74d11fe14fe7dc12335be9 | Patch |
| https://github.com/mantisbt/mantisbt/security/advisories/GHSA-fh48-f69w-7vmp | Patch Vendor Advisory Mitigation |
Configurations
History
No history.
Information
Published : 2026-03-23 20:16
Updated : 2026-03-25 13:58
NVD link : CVE-2026-33517
Mitre link : CVE-2026-33517
CVE.ORG link : CVE-2026-33517
JSON object : View
Products Affected
mantisbt
- mantisbt
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
