MaxKB is an open-source AI assistant for enterprise. Versions 2.7.1 and below contain a Stored Cross-Site Scripting (XSS) vulnerability that allows authenticated users to inject arbitrary HTML and JavaScript into the Application prologue (Opening Remarks) field by wrapping malicious payloads in <html_rander> tags. The backend fails to sanitize or encode HTML entities in the prologue field when applications are created or updated via the /admin/api/workspace/{workspace_id}/application endpoint, storing the raw payload directly in the database. The frontend then renders this content using an innerHTML-equivalent mechanism, trusting <html_rander>-wrapped content to be safe, which enables persistent DOM-based Stored XSS execution against any visitor who opens the affected chatbot interface. Exploitation can lead to session hijacking, unauthorized actions performed on behalf of victims (such as deleting workspaces or applications), and sensitive data exposure. This issue has been fixed in version 2.8.0.
References
| Link | Resource |
|---|---|
| https://github.com/1Panel-dev/MaxKB/releases/tag/v2.8.0 | Release Notes |
| https://github.com/1Panel-dev/MaxKB/security/advisories/GHSA-3rq5-pgm7-pvp4 | Vendor Advisory |
Configurations
History
20 Apr 2026, 17:31
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
| First Time |
Maxkb maxkb
Maxkb |
|
| CPE | cpe:2.3:a:maxkb:maxkb:*:*:*:*:-:*:*:* | |
| References | () https://github.com/1Panel-dev/MaxKB/releases/tag/v2.8.0 - Release Notes | |
| References | () https://github.com/1Panel-dev/MaxKB/security/advisories/GHSA-3rq5-pgm7-pvp4 - Vendor Advisory |
14 Apr 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-14 02:16
Updated : 2026-04-20 17:31
NVD link : CVE-2026-39425
Mitre link : CVE-2026-39425
CVE.ORG link : CVE-2026-39425
JSON object : View
Products Affected
maxkb
- maxkb
CWE
CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
