Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.1
SVXportal: Malicious Code Can Run in Admin Browser
CVE-2026-27505
Summary
SVXportal versions 2.5 and earlier store user-input data in the database without proper protection, allowing an attacker to inject malicious code that can run in an administrator's browser. This could allow the attacker to take control of the system. Update to the latest version of SVXportal to fix this issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| radioinorr | svxportal | <= 2.5 | – |
Original title
SVXportal version 2.5 and prior contain a stored cross-site scripting vulnerability in the user registration workflow (index.php submitting to admin/user_action.php). User-supplied fields such as F...
Original description
SVXportal version 2.5 and prior contain a stored cross-site scripting vulnerability in the user registration workflow (index.php submitting to admin/user_action.php). User-supplied fields such as Firstname, lastname, and email are stored in the backend database without adequate output encoding and are later rendered in the administrator interface (admin/users.php), allowing an unauthenticated remote attacker to inject arbitrary JavaScript that executes in an administrator's browser upon viewing the affected page.
nvd CVSS3.1
6.1
nvd CVSS4.0
5.1
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
Published: 20 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026