Reflected Cross-Site Scripting in the Wix web application

Posted date 11/02/2026
Identificador
INCIBE-2026-110
Importance
3 - Medium
Affected Resources

Wix web application.

Description

INCIBE has coordinated the publication of a medium-severity vulnerability affecting the Wix web application, a platform for creating websites. The vulnerability was discovered by Miguel Jiménez Cámara.

This vulnerability has been assigned the following code, CVSS v4.0 base score, CVSS vector, and CWE vulnerability type:

  • CVE-2026-2276: CVSS v4.0: 5.3 | CVSS /AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N | CWE-79
Solution

No solution has been reported at this time.

Detail

CVE-2026-2276: Reflected Cross-Site Scripting (XSS) vulnerability in the Wix web application, where the endpoint 'https://manage.wix.com/account/account-settings', responsible for uploading SVG images, does not properly sanitize the content. An authenticated attacker could upload an SVG file containing embedded JavaScript code, which is stored and subsequently executed when other users view the image. Exploiting this vulnerability allows arbitrary code to be executed in the context of the victim's browser, which could lead to the disclosure of sensitive information or the abuse of the affected user's session. 

CVE
Identificador CVE Severidad Explotación Fabricante
CVE-2026-2276 Media No WIX
References list