CVE-2026-39400

Cronicle is a multi-server task scheduler and runner, with a web based front-end UI. Prior to 0.9.111, a non-admin user with create_events and run_events privileges can inject arbitrary JavaScript through job output fields (html.content, html.title, table.header, table.rows, table.caption). The server stores this data without sanitization, and the client renders it via innerHTML on the Job Details page. This vulnerability is fixed in 0.9.111.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:cronicle:cronicle:*:*:*:*:*:*:*:*

History

15 Apr 2026, 20:24

Type Values Removed Values Added
CPE cpe:2.3:a:cronicle:cronicle:*:*:*:*:*:*:*:*
References () https://github.com/jhuckaby/Cronicle/security/advisories/GHSA-36q6-pwxv-j545 - () https://github.com/jhuckaby/Cronicle/security/advisories/GHSA-36q6-pwxv-j545 - Exploit, Vendor Advisory
First Time Cronicle
Cronicle cronicle
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1

07 Apr 2026, 21:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-07 21:17

Updated : 2026-04-15 20:24


NVD link : CVE-2026-39400

Mitre link : CVE-2026-39400

CVE.ORG link : CVE-2026-39400


JSON object : View

Products Affected

cronicle

  • cronicle
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')