← Advisories

Pachno 1.0.6 Stored Cross-Site Scripting

High
Advisory ID
ZSL-2026-5980
Release Date
12 April 2026
Vendor
Daniel André Eikeland - https://github.com/pachno/pachno
Affected Version
1.0.6
CVE
N/A
Tested On
GNU/Linux, Apache2, PHP/7.4, MySQL/5.7 (MariaDB)
Summary

Pachno is an open-source collaboration platform (formerly known as The Bug Genie) designed for team project management, issue tracking, and documentation. It offers a module-based, customizable environment for software development and team workflows, distributed under the Mozilla Public License.

Description

Input passed to the POST parameters value, comment_body, article_content, description and message via multiple controllers is not properly sanitised before being stored in the database and returned to the user. The application explicitly bypasses its own htmlspecialchars() sanitiser by calling Request::getRawParameter() or Request::getParameter($name, null, false). This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Proof of Concept
Disclosure Timeline
06.04.2026Vulnerability discovered.
09.04.2026Vendor contacted.
11.04.2026No response from the vendor.
12.04.2026Public security advisory released.
Credits
Vulnerability discovered by Gjoko Krstic
References
N/A
Changelog
12.04.2026Initial release