CVE-2026-22678 — The Email Template Description Field Of The System And Serve Cross-Site Scripting (XSS)
CVE-2026-22678 — Webmin before 2.641 contains a stored cross-site scripting vulnerability in the email template description field of the System and Server Status module that allows low-privileged authenticated attackers to execute arbitrary commands by injecting unsanitized input stored in save_tmpl
What This Means For You
- If your environment is affected by CWE-79, review your exposure and prioritize patching based on your environment. Monitor vendor advisories for CVE-2026-22678 updates and patches.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Stored XSS in Webmin Email Template Description - CVE-2026-22678
title: Stored XSS in Webmin Email Template Description - CVE-2026-22678
id: scw-2026-05-21-ai-1
status: experimental
level: high
description: |
Detects the specific stored XSS vulnerability in Webmin's email template description field (CVE-2026-22678). Attackers inject malicious JavaScript via the 'desc' parameter in save_tmpl.cgi, which is later rendered unescaped in list_tmpls.cgi. This rule looks for the save_tmpl.cgi endpoint with a 'desc' parameter containing potential XSS payloads.
author: SCW Feed Engine (AI-generated)
date: 2026-05-21
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-22678/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/save_tmpl.cgi'
cs-uri-query|contains:
- 'desc='
sc-status:
- 200
selection_payload:
cs-uri-query|contains:
- '<script>alert(' # Example of a common XSS payload start
- '<script>' # HTML encoded script tag
- 'javascript:' # Common in attribute injection
condition: selection AND selection_payload
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-22678 | vulnerability | CVE-2026-22678 |
| CWE-79 | weakness | CWE-79 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 22, 2026 at 01:16 UTC |
This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.
Believe this infringes your rights? Submit a takedown request.