Helpy contains a stored cross-site scripting vulnerability in the post author display logic. Any registered user can persist arbitrary HTML in their account name field and cause it to be rendered unescaped in public forum threads where they participate, in the admin ticket view, and in HTML notification emails sent to other users.This issue affects helpy: 2.8.0.
PUBLISHED5.2CWE-79
Helpy 2.8.0 - Stored XSS in post author display via PostsHelper
Problem type
Affected products
helpyio
helpy
2.8.0 - AFFECTED
References
fluidattacks.com
https://fluidattacks.com/es/advisories/offspring
github.com
https://github.com/helpyio/helpy
GitHub Security Advisories
GHSA-qxjc-9q88-9cgh
Helpy contains a stored cross-site scripting vulnerability in the post author display logic. Any...
https://github.com/advisories/GHSA-qxjc-9q88-9cghHelpy contains a stored cross-site scripting vulnerability in the post author display logic. Any registered user can persist arbitrary HTML in their account name field and cause it to be rendered unescaped in public forum threads where they participate, in the admin ticket view, and in HTML notification emails sent to other users.This issue affects helpy: 2.8.0.
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-40229Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-40229",
"assignerOrgId": "84fe0718-d6bb-4716-a7e8-81a6d1daa869",
"assignerShortName": "Fluid Attacks",
"dateUpdated": "2026-04-29T15:34:50.094Z",
"dateReserved": "2026-04-10T16:07:49.030Z",
"datePublished": "2026-04-29T15:34:50.094Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "84fe0718-d6bb-4716-a7e8-81a6d1daa869",
"shortName": "Fluid Attacks",
"dateUpdated": "2026-04-29T15:34:50.094Z"
},
"title": "Helpy 2.8.0 - Stored XSS in post author display via PostsHelper",
"descriptions": [
{
"lang": "en",
"value": "Helpy contains a stored cross-site scripting vulnerability in the post author display logic. Any registered user can persist arbitrary HTML in their account name field and cause it to be rendered unescaped in public forum threads where they participate, in the admin ticket view, and in HTML notification emails sent to other users.This issue affects helpy: 2.8.0.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "<span style=\"background-color: rgb(255, 255, 255);\">Helpy contains a stored cross-site scripting vulnerability in the post author display logic. Any registered user can persist arbitrary HTML in their account </span><code>name</code><span style=\"background-color: rgb(255, 255, 255);\"> field and cause it to be rendered unescaped in public forum threads where they participate, in the admin ticket view, and in HTML notification emails sent to other users.</span><p>This issue affects helpy: 2.8.0.</p>"
}
]
}
],
"affected": [
{
"vendor": "helpyio",
"product": "helpy",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "2.8.0",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')",
"cweId": "CWE-79",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://fluidattacks.com/es/advisories/offspring",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://github.com/helpyio/helpy",
"tags": [
"product"
]
}
],
"impacts": [
{
"capecId": "CAPEC-592",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-592 Stored XSS"
}
]
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Oscar Uribe",
"type": "finder"
},
{
"lang": "en",
"value": "Fluid Attacks' AI SAST Scanner",
"type": "finder"
}
]
}
}
}