shaarli_project CVE Vulnerabilities & Metrics

Focus on shaarli_project vulnerabilities and metrics.

Last updated: 08 Mar 2026, 23:25 UTC

About shaarli_project Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with shaarli_project. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total shaarli_project CVEs: 5
Earliest CVE date: 11 Oct 2017, 01:32 UTC
Latest CVE date: 26 Jan 2026, 23:16 UTC

Latest CVE reference: CVE-2026-24476

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): -100.0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): -100.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical shaarli_project CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.58

Max CVSS: 4.3

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 2
4.0-6.9 3
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS shaarli_project CVEs

These are the five CVEs with the highest CVSS scores for shaarli_project, sorted by severity first and recency.

All CVEs for shaarli_project

CVE-2026-24476 shaarli_project vulnerability CVSS: 0 26 Jan 2026, 23:16 UTC

Shaarli is a personal bookmarking service. Prior to version 0.16.0, crafting a malicious tag which starting with `"` prematurely ends the `<input>` tag on the start page and allows an attacker to add arbitrary html leading to a possible XSS attack. Version 0.16.0 fixes the issue.

CVE-2023-49469 shaarli_project vulnerability CVSS: 0 28 Dec 2023, 06:15 UTC

Reflected Cross Site Scripting (XSS) vulnerability in Shaarli v0.12.2, allows remote attackers to execute arbitrary code via search tag function.

CVE-2013-7351 shaarli_project vulnerability CVSS: 4.3 02 Jan 2020, 20:15 UTC

Multiple cross-site scripting (XSS) vulnerabilities in index.php in Shaarli allow remote attackers to inject arbitrary web script or HTML via the URL to the (1) showRSS, (2) showATOM, or (3) showDailyRSS function; a (4) file name to the importFile function; or (5) vectors related to bookmarks.

CVE-2018-5249 shaarli_project vulnerability CVSS: 4.3 05 Jan 2018, 20:29 UTC

Cross-site scripting (XSS) vulnerability in Shaarli before 0.8.5 and 0.9.x before 0.9.3 allows remote attackers to inject arbitrary code via the login form's username field (aka the login parameter to the ban_canLogin function in index.php).

CVE-2017-15215 shaarli_project vulnerability CVSS: 4.3 11 Oct 2017, 01:32 UTC

Reflected XSS vulnerability in Shaarli v0.9.1 allows an unauthenticated attacker to inject JavaScript via the searchtags parameter to index.php. If the victim is an administrator, an attacker can (for example) take over the admin session or change global settings or add/delete links. It is also possible to execute JavaScript against unauthenticated users.