Initiative is a self-hosted project management platform. Versions of the application prior to 0.32.4 are vulnerable to Stored Cross-Site Scripting (XSS) in the document upload functionality. Any user with upload permissions within the "Initiatives" section can upload a malicious `.html` or `.htm` file as a document. Because the uploaded HTML file is served under the application's origin without proper sandboxing, the embedded JavaScript executes in the context of the application. As a result, authentication tokens, session cookies, or other sensitive data can be exfiltrated to an attacker-controlled server. Additionally, since the uploaded file is hosted under the application's domain, simply sharing the direct file link may result in execution of the malicious script when accessed. Version 0.32.4 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/Morelitea/initiative/releases/tag/v0.32.4 | Product Release Notes |
| https://github.com/Morelitea/initiative/security/advisories/GHSA-v38c-x27x-p584 | Exploit Vendor Advisory |
Configurations
History
27 Feb 2026, 19:07
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Morelitea
Morelitea initiative |
|
| CPE | cpe:2.3:a:morelitea:initiative:*:*:*:*:*:*:*:* | |
| References | () https://github.com/Morelitea/initiative/releases/tag/v0.32.4 - Product, Release Notes | |
| References | () https://github.com/Morelitea/initiative/security/advisories/GHSA-v38c-x27x-p584 - Exploit, Vendor Advisory |
27 Feb 2026, 14:06
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
26 Feb 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-26 23:16
Updated : 2026-02-27 19:07
NVD link : CVE-2026-28274
Mitre link : CVE-2026-28274
CVE.ORG link : CVE-2026-28274
JSON object : View
Products Affected
morelitea
- initiative
