Incorrect escaping of a saved filter's owner allows an attacker to inject arbitrary HTML on systems where $gshowuser_realname = ON.
Cross-site scripting (XSS).
Note that By default, only users with Manager access level or above can save their filters publicly
$g_ show_user_realname = OFF; in configuration)g_stored_query_create_threshold / $g_stored_query_create_shared_threshold to NOBODY Thanks to siunam (Tang Cheuk Hei) for discovering and responsibly reporting the issue.
{
"github_reviewed": true,
"github_reviewed_at": "2026-05-11T19:35:05Z",
"cwe_ids": [
"CWE-79"
],
"severity": "HIGH",
"nvd_published_at": null
}