2026-04-29 15:34CVE-2026-40229Fluid Attacks
PUBLISHED5.2CWE-79

Helpy 2.8.0 - Stored XSS in post author display via PostsHelper

Helpy contains a stored cross-site scripting vulnerability in the post author display logic. Any registered user can persist arbitrary HTML in their account name field and cause it to be rendered unescaped in public forum threads where they participate, in the admin ticket view, and in HTML notification emails sent to other users.This issue affects helpy: 2.8.0.

Problem type

Affected products

helpyio

helpy

2.8.0 - AFFECTED

References

GitHub Security Advisories

GHSA-qxjc-9q88-9cgh

Helpy contains a stored cross-site scripting vulnerability in the post author display logic. Any...

https://github.com/advisories/GHSA-qxjc-9q88-9cgh

Helpy contains a stored cross-site scripting vulnerability in the post author display logic. Any registered user can persist arbitrary HTML in their account name field and cause it to be rendered unescaped in public forum threads where they participate, in the admin ticket view, and in HTML notification emails sent to other users.This issue affects helpy: 2.8.0.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-40229
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-40229",
    "assignerOrgId": "84fe0718-d6bb-4716-a7e8-81a6d1daa869",
    "assignerShortName": "Fluid Attacks",
    "dateUpdated": "2026-04-29T15:34:50.094Z",
    "dateReserved": "2026-04-10T16:07:49.030Z",
    "datePublished": "2026-04-29T15:34:50.094Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "84fe0718-d6bb-4716-a7e8-81a6d1daa869",
        "shortName": "Fluid Attacks",
        "dateUpdated": "2026-04-29T15:34:50.094Z"
      },
      "title": "Helpy 2.8.0 - Stored XSS in post author display via PostsHelper",
      "descriptions": [
        {
          "lang": "en",
          "value": "Helpy contains a stored cross-site scripting vulnerability in the post author display logic. Any registered user can persist arbitrary HTML in their account name field and cause it to be rendered unescaped in public forum threads where they participate, in the admin ticket view, and in HTML notification emails sent to other users.This issue affects helpy: 2.8.0.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<span style=\"background-color: rgb(255, 255, 255);\">Helpy contains a stored cross-site scripting vulnerability in the post author display logic. Any registered user can persist arbitrary HTML in their account </span><code>name</code><span style=\"background-color: rgb(255, 255, 255);\"> field and cause it to be rendered unescaped in public forum threads where they participate, in the admin ticket view, and in HTML notification emails sent to other users.</span><p>This issue affects helpy: 2.8.0.</p>"
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "helpyio",
          "product": "helpy",
          "platforms": [
            "Windows",
            "MacOS",
            "Linux"
          ],
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "2.8.0",
              "status": "affected"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')",
              "cweId": "CWE-79",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://fluidattacks.com/es/advisories/offspring",
          "tags": [
            "third-party-advisory"
          ]
        },
        {
          "url": "https://github.com/helpyio/helpy",
          "tags": [
            "product"
          ]
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-592",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-592 Stored XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Oscar Uribe",
          "type": "finder"
        },
        {
          "lang": "en",
          "value": "Fluid Attacks' AI SAST Scanner",
          "type": "finder"
        }
      ]
    }
  }
}