VYPR
Moderate severityGHSA Advisory· Published Apr 10, 2023· Updated Feb 7, 2025

CVE-2023-26120

CVE-2023-26120

Description

This affects all versions of the package com.xuxueli:xxl-job. HTML uploaded payload executed successfully through /xxl-job-admin/user/add and /xxl-job-admin/user/update.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

XXL-JOB before 3.2.0 is vulnerable to HTML injection via the user add/update endpoints, allowing stored XSS attacks.

Overview

All versions of the com.xuxueli:xxl-job package before 3.2.0 are vulnerable to HTML injection. The flaw exists in the endpoints /xxl-job-admin/user/add and /xxl-job-admin/user/update, which do not properly sanitize user-supplied input before storing it. Consequently, an attacker can submit HTML payloads that are later rendered unsanitized in the admin interface, leading to a stored cross-site scripting (XSS) vulnerability [1][2].

Exploitation

To exploit this issue, an attacker must have access to the XXL-Job admin web interface with sufficient privileges to create or modify user accounts. The attack does not require network-level access beyond the web application itself. By crafting a malicious HTML payload during user creation or profile update, the payload is stored on the server. When an administrator or other user views the affected page, the payload executes in their browser context [2][3].

Impact

Successful exploitation allows an attacker to execute arbitrary HTML and JavaScript in the victim's browser. This can be used to steal session cookies, perform actions on behalf of the victim, deface the interface, or redirect the user to malicious sites. The impact is limited to the context of the XXL-Job admin panel and the privileges of the logged-in user [2].

Mitigation

The vulnerability is fixed in XXL-JOB version 3.2.0. Users should upgrade to this version or later. No workarounds have been officially provided; however, as a general practice, input validation and output encoding should be applied to all user-controllable fields to prevent HTML injection [2][3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
com.xuxueli:xxl-jobMaven
<= 2.4.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.