Mantis Bug Tracker (MantisBT) is an open source issue tracker. In version 2.28.0, when deleting a Tag (tag_delete.php), improper escaping of its name when displaying the confirmation message allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript. Version 2.28.1 fixes the issue. Workarounds include reverting commit d6890320752ecf37bd74d11fe14fe7dc12335be9 and/or manually editing language files to remove the sprintf placeholder `%1$s` from `$s_tag_delete_message` string.
References
| Link | Resource |
|---|---|
| https://github.com/mantisbt/mantisbt/commit/80990f43153167c73f11eb4b2bc7108d0c3d6b46 | Patch |
| https://github.com/mantisbt/mantisbt/commit/d6890320752ecf37bd74d11fe14fe7dc12335be9 | Patch |
| https://github.com/mantisbt/mantisbt/security/advisories/GHSA-fh48-f69w-7vmp | Patch Vendor Advisory Mitigation |
Configurations
History
25 Mar 2026, 13:58
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://github.com/mantisbt/mantisbt/commit/80990f43153167c73f11eb4b2bc7108d0c3d6b46 - Patch | |
| References | () https://github.com/mantisbt/mantisbt/commit/d6890320752ecf37bd74d11fe14fe7dc12335be9 - Patch | |
| References | () https://github.com/mantisbt/mantisbt/security/advisories/GHSA-fh48-f69w-7vmp - Patch, Vendor Advisory, Mitigation | |
| CPE | cpe:2.3:a:mantisbt:mantisbt:2.28.0:*:*:*:*:*:*:* | |
| First Time |
Mantisbt mantisbt
Mantisbt |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
23 Mar 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-23 20:16
Updated : 2026-03-25 13:58
NVD link : CVE-2026-33517
Mitre link : CVE-2026-33517
CVE.ORG link : CVE-2026-33517
JSON object : View
Products Affected
mantisbt
- mantisbt
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
