Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 27 Feb 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sourcentis
Sourcentis mercator |
|
| CPEs | cpe:2.3:a:sourcentis:mercator:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Sourcentis
Sourcentis mercator |
|
| Metrics |
cvssV3_1
|
Wed, 25 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Feb 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dbarzin
Dbarzin mercator |
|
| Vendors & Products |
Dbarzin
Dbarzin mercator |
Wed, 25 Feb 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Mercator is an open source web application designed to enable mapping of information systems. A stored Cross-Site Scripting (XSS) vulnerability exists in Mercator prior to version 2026.02.22 due to the use of unescaped Blade directives (`{!! !!}`) in display templates. An authenticated user with the User role can inject arbitrary JavaScript payloads into fields such as "contact point" when creating or editing entities. The payload is then executed in the browser of any user who views the affected page, including administrators. Version 2026.02.22 fixes the vulnerability. | |
| Title | Mercator vulnerable to stored XSS via unescaped Blade directives in display templates | |
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-25T15:20:41.753Z
Reserved: 2026-02-20T22:02:30.029Z
Link: CVE-2026-27639
Updated: 2026-02-25T15:20:33.672Z
Status : Analyzed
Published: 2026-02-25T04:16:04.280
Modified: 2026-02-27T18:45:51.407
Link: CVE-2026-27639
No data.
OpenCVE Enrichment
Updated: 2026-02-25T11:34:44Z