VYPR
Medium severity6.1NVD Advisory· Published Jan 16, 2026· Updated Apr 15, 2026

CVE-2021-47844

CVE-2021-47844

Description

Xmind 2020 contains a cross-site scripting vulnerability that allows attackers to inject malicious payloads into mind mapping files or custom headers. Attackers can craft malicious files with embedded JavaScript that execute system commands when opened, enabling remote code execution through mouse interactions or file opening.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Xmind 2020 has a persistent XSS vulnerability allowing attackers to inject JavaScript into mind map files, leading to remote code execution when opened.

Vulnerability

Description

Xmind 2020 suffers from a persistent cross-site scripting (XSS) vulnerability, identified as CWE-79. Attackers can inject malicious JavaScript payloads into mind mapping files or custom header titles. The injected code is stored and executed when the victim interacts with the file, such as moving the mouse or clicking, or simply by opening the file [1][3].

Exploitation

Exploitation requires user interaction: the victim must open a specially crafted Xmind file or view a header containing the payload. The attack vector is network-based with low complexity and no authentication required, though user interaction is necessary. Proof-of-concept exploits demonstrate encoding the payload as an HTML img tag with an onerror event that spawns a child process to execute system commands like reading /etc/passwd [1].

Impact

Successful exploitation can lead to remote code execution on the victim's machine with the privileges of the user running Xmind. The CVSS v3.1 score is 6.1 (Medium), while the exploit-db entry assigns a risk of 8.8 (High) reflecting the potential for full confidentiality, integrity, and availability impact [1][3].

Mitigation

As of the published date (January 2026), no patch or vendor advisory has been identified for this vulnerability. Users of Xmind 2020 should treat the software as end-of-life for security purposes. Mitigation includes avoiding opening untrusted Xmind files and not clicking on suspicious headers. The vulnerability is not currently listed in CISA's Known Exploited Vulnerabilities catalog.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.