Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sat, 18 Apr 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Cross‑Site Scripting in Garoon Email Enables Password Reset for Any User |
Thu, 19 Feb 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 04 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cybozu
Cybozu cybozu Garoon Cybozu garoon |
|
| Vendors & Products |
Cybozu
Cybozu cybozu Garoon Cybozu garoon |
Mon, 02 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Feb 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cross-site scripting vulnerability exists in E-mail function of Cybozu Garoon 5.0.0 to 6.0.3, which may allow an attacker to reset arbitrary users’ passwords. | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2026-02-02T16:28:24.555Z
Reserved: 2026-01-27T00:30:57.072Z
Link: CVE-2026-20711
Updated: 2026-02-02T16:05:16.230Z
Status : Analyzed
Published: 2026-02-02T07:16:45.100
Modified: 2026-02-19T15:06:02.143
Link: CVE-2026-20711
No data.
OpenCVE Enrichment
Updated: 2026-04-18T14:30:02Z