<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Mantisbt/Mantisbt (&lt;= 2.28.1) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/mantisbt/mantisbt--2.28.1/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 19:42:20 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/mantisbt/mantisbt--2.28.1/feed.xml" rel="self" type="application/rss+xml"/><item><title>MantisBT Vulnerable to Stored XSS in File Download</title><link>https://feed.craftedsignal.io/briefs/2026-05-mantisbt-xss/</link><pubDate>Mon, 11 May 2026 19:42:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-mantisbt-xss/</guid><description>MantisBT is vulnerable to stored cross-site scripting (XSS) via file_download.php by using the `show_inline=1` parameter with a valid CSRF token to upload a crafted XHTML attachment referencing a JavaScript attachment, leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>MantisBT, a web-based bug tracking system, is vulnerable to a stored cross-site scripting (XSS) attack. The vulnerability exists in the <code>file_download.php</code> script. By exploiting this flaw, an attacker can inject malicious JavaScript code into the application, which will be executed in the context of other users&rsquo; browsers when they access the affected functionality. The vulnerability is triggered when processing file downloads, specifically when the <code>show_inline=1</code> parameter is used in conjunction with a valid <code>file_show_inline_token</code> CSRF token. This allows an attacker to upload a crafted XHTML attachment that references a JavaScript attachment. The vulnerability affects MantisBT versions 2.28.1 and earlier. This can lead to account takeover, sensitive data leakage, and other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to MantisBT as a user with permissions to upload attachments.</li>
<li>Attacker crafts a malicious JavaScript file (e.g., <code>evil.js</code>) containing the XSS payload.</li>
<li>Attacker crafts a malicious XHTML file (e.g., <code>evil.xhtml</code>) that includes the JavaScript file using <code>&lt;script src=&quot;evil.js&quot;&gt;&lt;/script&gt;</code>.</li>
<li>Attacker obtains a valid CSRF token for the <code>file_show_inline_token</code> parameter.</li>
<li>Attacker uploads both the <code>evil.js</code> and <code>evil.xhtml</code> files as attachments to a MantisBT issue.</li>
<li>Attacker crafts a request to <code>file_download.php</code> with the <code>show_inline=1</code> parameter, the valid CSRF token, and the file IDs of the uploaded <code>evil.xhtml</code> attachment.</li>
<li>A victim user clicks a link (or is redirected) to the crafted <code>file_download.php</code> URL.</li>
<li>The server serves the <code>evil.xhtml</code> file inline, which executes the embedded <code>evil.js</code> JavaScript in the victim&rsquo;s browser, allowing the attacker to perform actions on behalf of the victim.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary JavaScript code in the context of a victim&rsquo;s browser. This can lead to a variety of malicious activities, including session hijacking, defacement of the MantisBT interface, theft of sensitive information, or further exploitation of the MantisBT server or the victim&rsquo;s machine. Given the nature of bug tracking systems, successful exploitation could impact multiple users within an organization, potentially leading to widespread compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch provided by MantisBT (26647b2e68ba30b9d7987d4e03d7a16416684bc2) to remediate the vulnerability.</li>
<li>Deploy the Sigma rule &ldquo;Detect MantisBT XSS via file_download.php&rdquo; to identify potential exploitation attempts.</li>
<li>Monitor web server logs for requests to <code>file_download.php</code> with the <code>show_inline=1</code> parameter and potentially malicious content in the request.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>xss</category><category>mantisbt</category><category>github advisory</category></item></channel></rss>