You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
MantisBT has Stored XSS on Move Attachments Admin Page
High severity
GitHub Reviewed
Published
May 9, 2026
in
mantisbt/mantisbt
•
Updated May 11, 2026
Unescaped Project Name allows an attacker that can set it (which typically requires manager or administrator access level) to inject HTML in Move Attachments admin page.
Impact
Cross-site scripting (XSS).
This is mitigated by Content Security Policy which restricts scripts execution.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Learn more on MITRE.
Unescaped Project Name allows an attacker that can set it (which typically requires manager or administrator access level) to inject HTML in Move Attachments admin page.
Impact
Cross-site scripting (XSS).
This is mitigated by Content Security Policy which restricts scripts execution.
Patches
Workarounds
None
References