DEBIAN-CVE-2026-24476

Source
https://security-tracker.debian.org/tracker/CVE-2026-24476
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-24476.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-24476
Upstream
Published
2026-01-26T23:16:09.283Z
Modified
2026-01-27T11:16:31.865136Z
Severity
  • 5.3 (Medium) CVSS_V4 - CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

Shaarli is a personal bookmarking service. Prior to version 0.16.0, crafting a malicious tag which starting with " prematurely ends the <input> tag on the start page and allows an attacker to add arbitrary html leading to a possible XSS attack. Version 0.16.0 fixes the issue.

References

Affected packages

Debian:12 / shaarli

Package

Name
shaarli
Purl
pkg:deb/debian/shaarli?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.12.1+dfsg-8
0.12.1+dfsg-8+deb12u1
0.13.0+dfsg-1
0.13.0+dfsg-2
0.13.0+dfsg-3
0.13.0+dfsg-4
0.13.0+dfsg-5
0.14.0+dfsg-1
0.14.0+dfsg-2
0.15.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-24476.json"

Debian:13 / shaarli

Package

Name
shaarli
Purl
pkg:deb/debian/shaarli?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.14.0+dfsg-1
0.14.0+dfsg-2
0.15.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-24476.json"

Debian:14 / shaarli

Package

Name
shaarli
Purl
pkg:deb/debian/shaarli?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.14.0+dfsg-1
0.14.0+dfsg-2
0.15.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-24476.json"