Mantis Bug Tracker (MantisBT) is an open source issue tracker. In version 2.28.0, improper escaping of tag names retrieved from History in Timeline (my_view_page.php) allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript, when displaying a tag that has been renamed or deleted. Version 2.28.1 contains a patch. Workarounds include editing offending History entries (using SQL) and wrapping `$this->tag_name` in a string_html_specialchars() call in IssueTagTimelineEvent::html().
References
| Link | Resource |
|---|---|
| https://github.com/mantisbt/mantisbt/commit/f32787c14d4518476fe7f05f992dbfe6eaccd815 | Patch |
| https://github.com/mantisbt/mantisbt/security/advisories/GHSA-73vx-49mv-v8w5 | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-23 20:16
Updated : 2026-03-25 13:55
NVD link : CVE-2026-33548
Mitre link : CVE-2026-33548
CVE.ORG link : CVE-2026-33548
JSON object : View
Products Affected
mantisbt
- mantisbt
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
