Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mw8m-398g-h89w | changedetection.io Vulnerable to Reflected XSS in RSS Single Watch Error Response |
Fri, 27 Feb 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Feb 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Webtechnologies
Webtechnologies changedetection |
|
| CPEs | cpe:2.3:a:webtechnologies:changedetection:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Webtechnologies
Webtechnologies changedetection |
Wed, 25 Feb 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dgtlmoon
Dgtlmoon changedetection.io |
|
| Vendors & Products |
Dgtlmoon
Dgtlmoon changedetection.io |
Wed, 25 Feb 2026 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | changedetection.io is a free open source web page change detection tool. In versions prior to 0.54.1, the RSS single-watch endpoint reflects the UUID path parameter directly in the HTTP response body without HTML escaping. Since Flask returns text/html by default for plain string responses, the browser parses and executes injected JavaScript. Version 0.54.1 contains a fix for the issue. | |
| Title | changedetection.io Vulnerable to Reflected XSS in RSS Single Watch Error Response | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-25T14:55:58.413Z
Reserved: 2026-02-20T22:02:30.029Z
Link: CVE-2026-27645
Updated: 2026-02-25T14:53:48.952Z
Status : Analyzed
Published: 2026-02-25T05:17:26.317
Modified: 2026-02-25T16:51:33.417
Link: CVE-2026-27645
No data.
OpenCVE Enrichment
Updated: 2026-04-17T15:30:06Z
Github GHSA