CVE-2026-22678 — The Email Template Description Field Of The System And Serve Cross-Site Scripting (XSS)

CVE-2026-22678 — The Email Template Description Field Of The System And Serve Cross-Site Scripting (XSS)

CVE-2026-22678 — Webmin before 2.641 contains a stored cross-site scripting vulnerability in the email template description field of the System and Server Status module that allows low-privileged authenticated attackers to execute arbitrary commands by injecting unsanitized input stored in save_tmpl

What This Means For You

  • If your environment is affected by CWE-79, review your exposure and prioritize patching based on your environment. Monitor vendor advisories for CVE-2026-22678 updates and patches.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

Stored XSS in Webmin Email Template Description - CVE-2026-22678

Sigma YAML — free preview
title: Stored XSS in Webmin Email Template Description - CVE-2026-22678
id: scw-2026-05-21-ai-1
status: experimental
level: high
description: |
  Detects the specific stored XSS vulnerability in Webmin's email template description field (CVE-2026-22678). Attackers inject malicious JavaScript via the 'desc' parameter in save_tmpl.cgi, which is later rendered unescaped in list_tmpls.cgi. This rule looks for the save_tmpl.cgi endpoint with a 'desc' parameter containing potential XSS payloads.
author: SCW Feed Engine (AI-generated)
date: 2026-05-21
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-22678/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri|contains:
          - '/save_tmpl.cgi'
      cs-uri-query|contains:
          - 'desc='
      sc-status:
          - 200
  selection_payload:
      cs-uri-query|contains:
          - '<script>alert(' # Example of a common XSS payload start
          - '&#x3c;script&#x3e;' # HTML encoded script tag
          - 'javascript:' # Common in attribute injection
      condition: selection AND selection_payload
  
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-22678 vulnerability CVE-2026-22678
CWE-79 weakness CWE-79
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 22, 2026 at 01:16 UTC

This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.

Believe this infringes your rights? Submit a takedown request.

Related coverage

BookingPress Pro Plugin: Critical RCE via Unauthenticated File Upload

CVE-2026-6960 — The BookingPress Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'bookingpress_validate_submitted_booking_form_func' function in...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-434
/SCW Vulnerability Desk /CRITICAL /9.8 /⚑ 3 IOCs /⚙ 3 Sigma

LiteLLM Privilege Escalation: User Role Manipulation Grants Admin Access (CVE-2026-47102)

CVE-2026-47102 — LiteLLM prior to 1.83.10 allows a user to modify their own user_role via the /user/update endpoint. While the endpoint correctly restricts users to...

vulnerabilityCVEhigh-severitycwe-863
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 3 IOCs /⚙ 2 Sigma

LiteLLM Privilege Escalation Via API Key Misconfiguration (CVE-2026-47101)

CVE-2026-47101 — LiteLLM prior to 1.83.14 allows an authenticated internal_user to create API keys with access to routes that their role does not permit. When...

vulnerabilityCVEhigh-severityprivilege-escalationcwe-863
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 3 IOCs /⚙ 3 Sigma