Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. decidim-core
  4. ›
  5. CVE-2026-23891

CVE-2026-23891: Decidim has a cross-site scripting (XSS) in user name

April 13, 2026 (updated April 27, 2026)

A stored code execution vulnerability in the user name field allows a low-privileged attacker to execute arbitrary code in the context of any user who passively visits a comment page, resulting in high confidentiality and integrity impact across security boundaries.

References

  • github.com/advisories/GHSA-fc46-r95f-hq7g
  • github.com/decidim/decidim
  • github.com/decidim/decidim/releases/tag/v0.30.5
  • github.com/decidim/decidim/releases/tag/v0.31.1
  • github.com/decidim/decidim/security/advisories/GHSA-fc46-r95f-hq7g
  • nvd.nist.gov/vuln/detail/CVE-2026-23891

Code Behaviors & Features

Detect and mitigate CVE-2026-23891 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.31.0.rc1 before 0.31.1, all versions before 0.30.5

Fixed versions

  • 0.31.1
  • 0.30.5

Solution

Upgrade to versions 0.30.5, 0.31.1 or above.

Impact 8.7 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

gem/decidim-core/CVE-2026-23891.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:13 +0000.