Source: beets
Version: 2.8.0-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for beets.

CVE-2026-42052[0]:
| Beets is the media library management system. Prior to version
| 2.10.0, the bundled web UI uses Underscore template interpolation
| mode <%= ... %> for untrusted metadata fields. In this runtime, <%=
| ... %> is raw insertion and HTML escaping is only performed by <%-
| ... %>. Rendered output is then inserted with .html(...), allowing
| attacker-controlled markup to become active DOM. This issue has been
| patched in version 2.10.0.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-42052
    https://www.cve.org/CVERecord?id=CVE-2026-42052
[1] https://github.com/beetbox/beets/security/advisories/GHSA-3gxm-wfjx-m847

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to