Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Antsword Project
Antsword Project antsword |
|
| Vendors & Products |
Antsword Project
Antsword Project antsword |
Tue, 12 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AntSword is a cross-platform website management toolkit. Prior to 2.1.16, incomplete noxss() sanitization leads to 1-click RCE via jquery.terminal format code injection. This vulnerability is fixed in 2.1.16. | |
| Title | AntSword: Incomplete noxss() sanitization leads to 1-click RCE via jquery.terminal format code injection | |
| Weaknesses | CWE-1188 CWE-79 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T14:10:20.899Z
Reserved: 2026-05-04T15:17:09.330Z
Link: CVE-2026-43892
Updated: 2026-05-13T14:10:15.850Z
Status : Deferred
Published: 2026-05-12T18:17:28.640
Modified: 2026-05-13T18:24:31.310
Link: CVE-2026-43892
No data.
OpenCVE Enrichment
Updated: 2026-05-12T23:30:26Z