HTML Injection Vulnerability in Lichess Chess Server
CVE-2026-35208

5.3MEDIUM

Key Information:

Status
Vendor
CVE Published:
6 April 2026

What is CVE-2026-35208?

Lichess.org, an open-source chess server, has been found to be vulnerable to HTML injection. Approved streamers can embed arbitrary HTML within their Twitch or YouTube stream titles, which is subsequently injected into the Lichess user interface. Even though Content Security Policy is engaged to prevent inline script execution, the vulnerability still allows for server-side HTML injection. To exploit this vulnerability, a streamer account must meet basic requirements, such as being at least two days old or possessing a verified status. Upon going live, the platform pulls the stream title and renders it directly into the UI without sanitization, posing a security risk. This issue has been addressed in a recent commit to the codebase.

Affected Version(s)

lila < 0d5002696ae705e1888bf77de107c73de57bb1b3

References

CVSS V4

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.