Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-40472 β€” AI Deep Analysis Summary

CVSS 9.9 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: hackage-server suffers from a **Stored XSS** vulnerability. <br>πŸ’₯ **Consequences**: User-controlled metadata is not sanitized.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-79 (Improper Neutralization of Input During Web Page Generation). <br>πŸ” **Flaw**: The server fails to properly clean/escape **user-controlled metadata** before storing or rendering it.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected Component**: **hackage-server** (Haskell package repository server). <br>🌐 **Scope**: Any instance running this open-source Haskell software.…

Q4What can hackers do? (Privileges/Data)

πŸ’» **Attacker Actions**: <br>1. Inject malicious JavaScript via metadata fields. <br>2. Execute code in victims' browsers (Stored XSS). <br>3. Steal cookies/session tokens. <br>4. Perform actions on behalf of victims.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ” **Auth Required**: **Yes**. The CVSS vector `PR:L` indicates **Privileges Required: Low**. <br>πŸ‘€ **Requirement**: An attacker needs a low-level account to submit metadata.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exploit**: **No**. The `pocs` field is empty in the provided data. <br>🌍 **Wild Exploitation**: Unconfirmed.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: <br>1. Scan for **hackage-server** instances. <br>2. Look for metadata fields that accept raw HTML/JS input. <br>3. Test if injected scripts execute without escaping.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Official Fix**: **Likely Yes**. The CVE is published (2026-04-23), implying a fix or advisory exists. <br>πŸ“₯ **Action**: Update hackage-server to the latest patched version.…

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: <br>1. **Input Validation**: Strictly sanitize all metadata inputs server-side. <br>2. **Output Encoding**: Ensure all metadata is HTML-encoded before rendering. <br>3.…

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **High**. <br>πŸ“ˆ **Risk**: CVSS Score implies High Impact on Confidentiality/Integrity. <br>🎯 **Priority**: Immediate patching recommended.…