Helpy contains a stored cross-site scripting vulnerability in the post author display logic. Any registered user can persist arbitrary HTML in their account name field and cause it to be rendered unescaped in public forum threads where they participate, in the admin ticket view, and in HTML notification emails sent to other users.This issue affects helpy: 2.8.0.
References
| Link | Resource |
|---|---|
| https://fluidattacks.com/es/advisories/offspring | Exploit Third Party Advisory |
| https://github.com/helpyio/helpy | Product |
Configurations
History
01 May 2026, 12:25
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
| CPE | cpe:2.3:a:helpy.io:helpy:2.8.0:*:*:*:*:*:*:* | |
| References | () https://fluidattacks.com/es/advisories/offspring - Exploit, Third Party Advisory | |
| References | () https://github.com/helpyio/helpy - Product | |
| First Time |
Helpy.io
Helpy.io helpy |
30 Apr 2026, 15:11
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-29 16:16
Updated : 2026-05-01 12:25
NVD link : CVE-2026-40229
Mitre link : CVE-2026-40229
CVE.ORG link : CVE-2026-40229
JSON object : View
Products Affected
helpy.io
- helpy
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
