Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 23 Apr 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:docmost:docmost:*:*:*:*:*:*:*:* |
Wed, 22 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Docmost
Docmost docmost |
|
| Vendors & Products |
Docmost
Docmost docmost |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Docmost is open-source collaborative wiki and documentation software. Prior to 0.80.0, when leaving a comment on a page, it is possible to include a JavaScript URI as the link. When a user clicks on the link the JavaScript executes. This vulnerability is fixed in 0.80.0. | |
| Title | Docmost: XSS in Comments with JavaScript URI | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-22T17:42:15.540Z
Reserved: 2026-04-15T20:40:15.517Z
Link: CVE-2026-40927
Updated: 2026-04-22T17:42:09.840Z
Status : Analyzed
Published: 2026-04-21T21:16:46.110
Modified: 2026-04-23T15:50:16.280
Link: CVE-2026-40927
No data.
OpenCVE Enrichment
Updated: 2026-04-22T06:30:10Z