Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 13 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Pachno 1.0.6 contains a stored cross-site scripting vulnerability that allows attackers to execute arbitrary HTML and script code by injecting malicious payloads into POST parameters. Attackers can inject scripts through the value, comment_body, article_content, description, and message parameters across multiple controllers, which are stored in the database and executed in users' browser sessions due to improper sanitization via Request::getRawParameter() or Request::getParameter() calls. | |
| Title | Pachno 1.0.6 Stored Cross-Site Scripting via Multiple Parameters | |
| First Time appeared |
Pachno
Pachno pachno |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:pachno:pachno:1.0.6:*:*:*:*:*:*:* | |
| Vendors & Products |
Pachno
Pachno pachno |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-12T01:02:24.312Z
Reserved: 2026-04-08T13:39:22.099Z
Link: CVE-2026-40038
Updated: 2026-04-13T18:58:31.280Z
Status : Deferred
Published: 2026-04-13T19:16:51.263
Modified: 2026-04-17T15:28:29.690
Link: CVE-2026-40038
No data.
OpenCVE Enrichment
Updated: 2026-04-14T16:33:42Z