diff --git a/vulnerabilities/AIKIDO-2026-10304.json b/vulnerabilities/AIKIDO-2026-10304.json new file mode 100644 index 00000000..266e5824 --- /dev/null +++ b/vulnerabilities/AIKIDO-2026-10304.json @@ -0,0 +1,31 @@ +{ + "package_name": "statamic/cms", + "patch_versions": [ + "6.3.3", + "5.73.10" + ], + "vulnerable_ranges": [ + [ + "6.0.0", + "6.3.2" + ], + [ + "5.0.0", + "5.73.9" + ] + ], + "cwe": [ + "CWE-79" + ], + "tldr": "Affected versions of this package improperly rendered user-controlled content directly into the DOM using mechanisms such as `v-html`, `innerHTML`, and unsanitized HTML returned by `marked`, enabling the injection of arbitrary HTML or JavaScript. Without proper sanitization or escaping, attacker-supplied input could be interpreted as executable markup instead of plain text. An attacker could exploit this by injecting malicious payloads (e.g., `