MantisBT has Stored HTML Injection/XSS when displaying Tags in Timeline
Description
Published by the National Vulnerability Database
Mar 23, 2026
Published to the GitHub Advisory Database
Mar 25, 2026
Reviewed
Mar 25, 2026
Last updated
Mar 25, 2026
Improper escaping of tag names retrieved from History in Timeline (my_view_page.php) allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript, when displaying a tag that has been renamed or deleted.
Impact
Cross-site scripting (XSS).
Patches
f32787c14d4518476fe7f05f992dbfe6eaccd815
Workarounds
$this->tag_namein a string_html_specialchars() call in IssueTagTimelineEvent::html()Credits
MantisBT thanks Vishal Shukla for discovering and responsibly reporting the issue.
References