When cloning an issue originating from a Project other than the current one, the clone form (bugreportpage.php) prepends the source Project name before the category selector without proper escaping, allowing an attacker able to to inject HTML if they can set the Project's name (which typically requires manager or administrator access level).
Cross-site scripting (XSS). This is mitigated by Content Security Policy which restricts scripts execution.
Make sure Project names do not contain any HTML tags.
Thanks to Vishal Shukla for discovering and responsibly reporting the issue.
The vulnerability was also identified and independently reported by @siunam321 (Tang Cheuk Hei), prior to this Advisory's publication.
{
"github_reviewed": true,
"github_reviewed_at": "2026-05-11T19:32:11Z",
"cwe_ids": [
"CWE-79"
],
"severity": "HIGH",
"nvd_published_at": null
}