PMD is an extensible multilanguage static code analyzer. Prior to version 7.22.0, PMD's `vbhtml` and `yahtml` report formats insert rule violation messages into HTML output without escaping. When PMD analyzes untrusted source code containing crafted string literals, the generated HTML report contains executable JavaScript that runs when opened in a browser. Practical impact is limited because `vbhtml` and `yahtml` are legacy formats rarely used in practice. The default `html` format is properly escaped and not affected. Version 7.22.0 contains a fix for the issue.
Metrics
Affected Vendors & Products
References
History
Tue, 03 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 03 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pmd Project
Pmd Project pmd |
|
| CPEs | cpe:2.3:a:pmd_project:pmd:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Pmd Project
Pmd Project pmd |
Mon, 02 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pmd
Pmd pmd |
|
| Vendors & Products |
Pmd
Pmd pmd |
Fri, 27 Feb 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PMD is an extensible multilanguage static code analyzer. Prior to version 7.22.0, PMD's `vbhtml` and `yahtml` report formats insert rule violation messages into HTML output without escaping. When PMD analyzes untrusted source code containing crafted string literals, the generated HTML report contains executable JavaScript that runs when opened in a browser. Practical impact is limited because `vbhtml` and `yahtml` are legacy formats rarely used in practice. The default `html` format is properly escaped and not affected. Version 7.22.0 contains a fix for the issue. | |
| Title | PMD Designer has Stored XSS in VBHTMLRenderer and YAHTMLRenderer via unescaped violation messages | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-02-27T20:28:05.739Z
Updated: 2026-03-03T20:26:01.369Z
Reserved: 2026-02-26T18:38:13.889Z
Link: CVE-2026-28338
Updated: 2026-03-03T20:25:58.288Z
Status : Analyzed
Published: 2026-02-27T21:16:19.017
Modified: 2026-03-03T18:43:33.240
Link: CVE-2026-28338
No data.