CVE-2026-28338

medium

Description

PMD is an extensible multilanguage static code analyzer. Prior to version 7.22.0, PMD's `vbhtml` and `yahtml` report formats insert rule violation messages into HTML output without escaping. When PMD analyzes untrusted source code containing crafted string literals, the generated HTML report contains executable JavaScript that runs when opened in a browser. Practical impact is limited because `vbhtml` and `yahtml` are legacy formats rarely used in practice. The default `html` format is properly escaped and not affected. Version 7.22.0 contains a fix for the issue.

References

https://github.com/pmd/pmd/security/advisories/GHSA-8rr6-2qw5-pc7r

https://github.com/pmd/pmd/pull/6475

https://github.com/pmd/pmd/commit/c140c0e1de5853a08efb84c9f91dfeb015882442

Details

Source: Mitre, NVD

Published: 2026-02-27

Updated: 2026-03-03

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 6.1

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Severity: Medium

EPSS

EPSS: 0.00031