Cronicle is a multi-server task scheduler and runner, with a web based front-end UI. Prior to 0.9.111, a non-admin user with create_events and run_events privileges can inject arbitrary JavaScript through job output fields (html.content, html.title, table.header, table.rows, table.caption). The server stores this data without sanitization, and the client renders it via innerHTML on the Job Details page. This vulnerability is fixed in 0.9.111.
References
| Link | Resource |
|---|---|
| https://github.com/jhuckaby/Cronicle/security/advisories/GHSA-36q6-pwxv-j545 | Exploit Vendor Advisory |
Configurations
History
15 Apr 2026, 20:24
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:cronicle:cronicle:*:*:*:*:*:*:*:* | |
| References | () https://github.com/jhuckaby/Cronicle/security/advisories/GHSA-36q6-pwxv-j545 - Exploit, Vendor Advisory | |
| First Time |
Cronicle
Cronicle cronicle |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
07 Apr 2026, 21:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-07 21:17
Updated : 2026-04-15 20:24
NVD link : CVE-2026-39400
Mitre link : CVE-2026-39400
CVE.ORG link : CVE-2026-39400
JSON object : View
Products Affected
cronicle
- cronicle
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
