Stored XSS via incomplete HTML attribute escaping in Team-Member widget
Affected versions
- Affected versions: <= 2.52.0
- Patched version: 2.53.0
- Advisory published: 14 Apr 2026
Severity
Severity: High
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2026-40479 to this issue.
Vulnerability
Kimai contained a stored cross-site scripting vulnerability in the team member widget. The client-side HTML escaping logic did not escape quote characters correctly, which allowed attacker-controlled profile data to break out of an HTML attribute context.
In affected versions, a malicious value stored in the user alias field could execute JavaScript when the generated markup was rendered in the browser.
Info
This issue affected the escaping logic used for user-controlled content in HTML attributes.
- The vulnerable code path escaped
<,>and&, but not single or double quotes - The payload could be stored in profile data and later rendered in the team member widget
- Exploitation could lead to stored XSS in privileged browser sessions
- A low-privileged user could target administrators who viewed the affected UI
Solution
Users should update to 2.53.0 or newer.
Credits
- Reported by: wooseokdotkim
- Patched by: kevinpapst
First reported in GitHub advisory: GHSA-g82g-m9vx-vhjg
Kimai