CVE-2026-24476

NameCVE-2026-24476
DescriptionShaarli is a personal bookmarking service. Prior to version 0.16.0, crafting a malicious tag which starting with `"` prematurely ends the `<input>` tag on the start page and allows an attacker to add arbitrary html leading to a possible XSS attack. Version 0.16.0 fixes the issue.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
shaarli (PTS)bookworm0.12.1+dfsg-8+deb12u1vulnerable
trixie0.14.0+dfsg-2vulnerable
forky, sid0.15.0+dfsg-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
shaarlisource(unstable)(unfixed)

Notes

https://github.com/shaarli/Shaarli/security/advisories/GHSA-g3xq-mj52-f8pg
https://github.com/shaarli/Shaarli/commit/b854c789289c4b0dfbb7c1e5793bae7d8f94e063 (v0.16.0)

Search for package or bug name: Reporting problems