Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution has been reported at this time.
Workaround
No workaround given by the vendor.
Thu, 12 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Feb 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wix
Wix web Application |
|
| Vendors & Products |
Wix
Wix web Application |
Thu, 12 Feb 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Reflected Cross-Site Scripting (XSS) vulnerability in the Wix web application, where the endpoint ' https://manage.wix.com/account/account-settings ', responsible for uploading SVG images, does not properly sanitize the content. An authenticated attacker could upload an SVG file containing embedded JavaScript code, which is stored and subsequently executed when other users view the image. Exploiting this vulnerability allows arbitrary code to be executed in the context of the victim's browser, which could lead to the disclosure of sensitive information or the abuse of the affected user's session. | |
| Title | Reflected Cross-Site Scripting in the Wix web application | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-02-12T14:18:39.272Z
Reserved: 2026-02-10T13:03:46.213Z
Link: CVE-2026-2276
Updated: 2026-02-12T14:18:29.775Z
Status : Awaiting Analysis
Published: 2026-02-12T11:15:50.113
Modified: 2026-02-12T15:10:37.307
Link: CVE-2026-2276
No data.
OpenCVE Enrichment
Updated: 2026-02-12T12:22:39Z