


Perceptive Security
SOC/SIEM Consultancy

In hackage-server, user-controlled metadata from .cabal files are rendered into HTML
href attributes without proper sanitization, enabling stored
Cross-Site Scr…
Published:
22 April 2026 at 22:00:00
Alert date:
23 April 2026 at 17:04:31
Source:
nvd.nist.gov
Web Technologies, Supply Chain & Dependencies
A stored Cross-Site Scripting (XSS) vulnerability exists in hackage-server where user-controlled metadata from .cabal files are rendered into HTML href attributes without proper sanitization. This allows attackers to inject malicious scripts that execute when users interact with the affected pages. The vulnerability affects the Haskell package repository infrastructure and could be exploited to compromise user accounts or steal sensitive information. The stored nature of the XSS makes it particularly dangerous as the malicious payload persists in the application.
Technical details
Mitigation steps:
Affected products:
hackage-server
Related links:
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
