VYPR
Medium severity5.4NVD Advisory· Published Feb 4, 2026· Updated Apr 15, 2026

CVE-2026-21393

CVE-2026-21393

Description

Movable Type contains a stored cross-site scripting vulnerability in Edit Comment. If crafted input is stored by an attacker, arbitrary script may be executed on a logged-in user's web browser. Note that Movable Type 7 series and 8.4 series, which are End-of-Life (EOL), are affected by the vulnerability as well.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Movable Type Edit Comment contains a stored cross-site scripting (XSS) vulnerability, allowing an attacker to execute arbitrary script in a logged-in user's browser.

Vulnerability

Description

Movable Type's Edit Comment functionality is affected by a stored cross-site scripting (XSS) vulnerability (CWE-79) [1][2]. The flaw allows an attacker to store crafted input that, when viewed by a logged-in user, executes arbitrary script in their web browser. The root cause is insufficient sanitization of user-supplied data within comment editing fields.

Attack

Vector

The attack requires low privileges (authenticated user) and user interaction, as the victim must access the malicious comment [2]. The attacker can store the payload by submitting a crafted comment through the normal comment submission mechanism, with no special network position required beyond standard web access. The vulnerability is exploitable on affected versions including Movable Type 7.x and 8.4.x series, which are End-of-Life (EOL) [1][2].

Impact

Successful exploitation leads to execution of arbitrary script in the context of the victim's session, potentially enabling actions such as session hijacking, content manipulation, or forced operations on behalf of the logged-in user. The CVSS v3 base score is 5.4 (Medium) with a vector of AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N [2].

Mitigation

Six Apart released security updates on February 4, 2026, including Movable Type 9.1.0, 9.0.6, 8.8.2, and 8.0.9, and corresponding Premium versions, which address this vulnerability [1][3]. Users on EOL branches (7.x, 8.4.x) are strongly advised to upgrade to a supported, patched version [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.