Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-fc46-r95f-hq7g | Decidim has a cross-site scripting (XSS) in user name |
Wed, 22 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:decidim:decidim:*:*:*:*:*:ruby:*:* | |
| Metrics |
cvssV3_1
|
Tue, 14 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 14 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Decidim
Decidim decidim |
|
| Vendors & Products |
Decidim
Decidim decidim |
Mon, 13 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Decidim is a participatory democracy framework. In versions below 0.30.5 and 0.31.0.rc1 through 0.31.0, a stored code execution vulnerability in the user name field allows a low-privileged attacker to execute arbitrary code in the context of any user who passively visits a comment page, resulting in high confidentiality and integrity impact across security boundaries. This issue has been fixed in versions 0.30.5 and 0.31.1. | |
| Title | Decidim has a Cross-site scripting (XSS) vulnerability via user name field | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-14T16:29:24.311Z
Reserved: 2026-01-16T21:02:02.902Z
Link: CVE-2026-23891
Updated: 2026-04-14T15:24:00.693Z
Status : Analyzed
Published: 2026-04-13T17:16:28.063
Modified: 2026-04-22T16:40:25.103
Link: CVE-2026-23891
No data.
OpenCVE Enrichment
Updated: 2026-04-14T16:33:53Z
Github GHSA