CVE-2026-27614
Bugsink · Bugsink
An unauthenticated stored cross-site scripting (XSS) vulnerability in Bugsink allows attackers to execute arbitrary JavaScript in an administrator's browser, leading to account takeover.
Executive summary
Unauthenticated attackers can inject malicious scripts into Bugsink error logs, which execute when viewed by an administrator, potentially resulting in full administrative compromise.
Vulnerability
The vulnerability is located in the _pygmentize_lines() function within theme/templatetags/issues.py. An unauthenticated attacker can submit a crafted event that triggers a raw input fallback, which is then passed to mark_safe() without sanitization, allowing for stored XSS.
Business impact
A successful exploit allows an attacker to hijack administrative sessions, modify project settings, or access sensitive error data and source code snippets. The CVSS score of 9.3 reflects the critical nature of this vulnerability, as it requires no authentication to plant the payload and targets high-privilege users.
Remediation
Immediate Action: Update Bugsink to version 2.0.13 immediately to ensure that all stacktrace outputs are properly sanitized before rendering.
Proactive Monitoring: Review web server and application logs for unusual DSN endpoint activity or suspicious JavaScript payloads within the event database.
Compensating Controls: Deploy a Web Application Firewall (WAF) to filter common XSS patterns and restrict access to the Bugsink web UI to known administrative IP ranges.
Exploitation status
Public Exploit Available: No
Analyst recommendation
The ability for unauthenticated external actors to target internal administrators via standard error reporting protocols is a significant risk. We strongly recommend immediate deployment of version 2.0.13 and a thorough audit of existing stored events for any suspicious scripts.