{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-40201","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","state":"PUBLISHED","assignerShortName":"mitre","dateReserved":"2026-04-10T06:45:33.622Z","datePublished":"2026-05-01T08:36:39.932Z","dateUpdated":"2026-05-01T08:40:58.229Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://registry.npmjs.org","defaultStatus":"unaffected","packageName":"@diplodoc/search-extension","packageURL":"pkg:npm/%40diplodoc/search-extension","platforms":["Windows"],"product":"@diplodoc/search-extension","programFiles":["format.ts"],"programRoutines":[{"name":"highlighte"}],"repo":"https://github.com/diplodoc-platform/search-extension","vendor":"diplodoc-platform","versions":[{"lessThan":"3.0.3","status":"affected","version":"1.0.0","versionType":"semver"}]}],"descriptions":[{"lang":"en","value":"@diplodoc/search-extension 1.0.0 through 3.x before 3.0.3 allows stored XSS via the title in a .md file."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2026-05-01T08:40:58.229Z"},"references":[{"tags":["product"],"url":"https://github.com/diplodoc-platform/search-extension/releases"},{"url":"https://github.com/diplodoc-platform/search-extension/pull/41"},{"url":"https://github.com/diplodoc-platform/search-extension/releases/tag/v3.0.3"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Use the function escapeHtml within&nbsp;highlighte.</p>"}],"value":"Use the function escapeHtml within highlighte."}],"x_generator":{"engine":"CVE-Request-form 0.0.1"}}}}