Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-27614 β€” AI Deep Analysis Summary

CVSS 9.3 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Bugsink < 2.0.13 suffers from **Stored XSS** (CWE-79). πŸ“‰ **Consequences**: Attackers inject malicious JS into bug reports. When admins view stack traces, the script executes in their browser.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-79** (Improper Neutralization of Input During Web Page Generation). ❌ **Flaw**: The application fails to sanitize user-submitted event descriptions.…

Q3Who is affected? (Versions/Components)

🎯 **Affected**: **Bugsink** (Self-hosted Bug Tracking Software). πŸ“¦ **Versions**: All versions **prior to 2.0.13**. βœ… **Fixed**: Version 2.0.13 and later are safe. 🏒 **Vendor**: Bugsink.

Q4What can hackers do? (Privileges/Data)

πŸ’» **Actions**: Execute arbitrary JavaScript in the context of the **Admin** user. πŸ•΅οΈ **Privileges**: Steal admin cookies/sessions, redirect admins, or perform actions on behalf of the admin.…

Q5Is exploitation threshold high? (Auth/Config)

βš–οΈ **Threshold**: **Medium**. 🌐 **Network**: Remote (AV:N). πŸ”‘ **Auth**: No authentication required to submit events (PR:N). πŸ–±οΈ **User Interaction**: Required (UI:R) – An admin must click/view the infected stack trace.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exploit**: **No**. πŸ“ **PoC**: The `pocs` array is empty in the data. πŸ“’ **Status**: Advisory published (GHSA-vp6q-7m36-pq3w), but no specific code exploit is publicly available yet.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for **Bugsink** instances. πŸ“‹ **Verify Version**: Check if the running version is **< 2.0.13**. πŸ§ͺ **Test**: Try submitting a bug report with a simple `<script>alert(1)</script>` payload.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: **Yes**. πŸ”„ **Patch**: Upgrade to **Bugsink 2.0.13** or later. πŸ”— **Source**: See GitHub release notes and commit `e784d6aeb0d5f29b40c2779d2544c2b9ef097ee9`.…

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: 1. **Restrict Access**: Limit who can submit events (if possible). 2. **Monitor**: Alert admins to inspect new reports carefully. 3.…

Q10Is it urgent? (Priority Suggestion)

⚠️ **Priority**: **High**. πŸš€ **Urgency**: CVSS Score is **High** (C:H, I:H). πŸ“… **Published**: Feb 25, 2026.…