CVE-2026-24476

NameCVE-2026-24476
DescriptionShaarli is a personal bookmarking service. Prior to version 0.16.0, crafting a malicious tag which starting with `"` prematurely ends the `<input>` tag on the start page and allows an attacker to add arbitrary html leading to a possible XSS attack. Version 0.16.0 fixes the issue.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-6128-1
Debian Bugs1126554

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
shaarli (PTS)bookworm0.12.1+dfsg-8+deb12u1vulnerable
bookworm (security)0.12.1+dfsg-8+deb12u2fixed
trixie0.14.0+dfsg-2vulnerable
trixie (security)0.14.0+dfsg-2+deb13u1fixed
forky, sid0.16.1+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
shaarlisourcebookworm0.12.1+dfsg-8+deb12u2DSA-6128-1
shaarlisourcetrixie0.14.0+dfsg-2+deb13u1DSA-6128-1
shaarlisource(unstable)0.16.1+dfsg-11126554

Notes

https://github.com/shaarli/Shaarli/security/advisories/GHSA-g3xq-mj52-f8pg
https://github.com/shaarli/Shaarli/commit/b854c789289c4b0dfbb7c1e5793bae7d8f94e063 (v0.16.0)

Search for package or bug name: Reporting problems