Description
A reflected cross-site scripting vulnerability exists in Nexus Repository 3 that allows unauthenticated attackers to execute arbitrary JavaScript in a victim's browser through a specially crafted request requiring user interaction.
Published: 2026-01-14
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (reflected)
Action: Apply Patch
AI Analysis

Impact

A reflected cross‑site scripting vulnerability exists in Nexus Repository 3 that permits an unauthenticated attacker to execute arbitrary JavaScript in a victim’s browser. The flaw is triggered when a victim accesses a specially crafted request; the malicious payload is reflected back and executed. Because the payload is not stored on the server, the impact is limited to the session of the victim’s browser, but it could enable cookie theft, session hijacking, or phishing attacks.

Affected Systems

The vulnerability affects Sonatype Nexus Repository Manager, specifically versions 3.82.0 through 3.87.1 inclusive, as identified by the CNA. All releases prior to 3.88.0 lack the mitigations announced in the official 3.88.0 release notes. The affected components are the web interface that processes query parameters and renders them without proper sanitization.

Risk and Exploitability

The CVSS v3.1 score is 5.1, indicating moderate severity. EPSS is less than 1%, meaning the probability of exploitation is presently low, and the vulnerability is not listed in the CISA KEV catalog. The flaw requires that an attacker sends a crafted request to an unauthenticated end‑user, who must then interact with the resulting page for the script to run. No authentication or privileged access is needed, making the threat accessible to anyone with a web browser. Because the vulnerability is reflected, it does not persist on the server, but it can still be leveraged to compromise user sessions or conduct phishing attacks.

Generated by OpenCVE AI on April 18, 2026 at 06:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Sonatype Nexus Repository Manager to version 3.88.0 or newer following the official release notes.
  • If an immediate upgrade is not feasible, restrict unauthenticated access to the web interface or disable any features that expose query parameters to reflected output.
  • Implement a strict Content‑Security‑Policy on browsers interacting with Nexus to block the execution of unexpected scripts.
  • Validate all input data on the server side to ensure that no malicious code can be injected through query strings or form fields.

Generated by OpenCVE AI on April 18, 2026 at 06:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 15 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 14 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Description A reflected cross-site scripting vulnerability exists in Nexus Repository 3 that allows unauthenticated attackers to execute arbitrary JavaScript in a victim's browser through a specially crafted request requiring user interaction.
Title Nexus Repository 3 - Cross-Site Scripting
First Time appeared Sonatype
Sonatype nexus Repository Manager
Weaknesses CWE-79
CPEs cpe:2.3:a:sonatype:nexus_repository_manager:3.82.0:*:*:*:*:*:*:*
cpe:2.3:a:sonatype:nexus_repository_manager:3.83.0:*:*:*:*:*:*:*
cpe:2.3:a:sonatype:nexus_repository_manager:3.83.1:*:*:*:*:*:*:*
cpe:2.3:a:sonatype:nexus_repository_manager:3.83.2:*:*:*:*:*:*:*
cpe:2.3:a:sonatype:nexus_repository_manager:3.84.0:*:*:*:*:*:*:*
cpe:2.3:a:sonatype:nexus_repository_manager:3.84.1:*:*:*:*:*:*:*
cpe:2.3:a:sonatype:nexus_repository_manager:3.85.0:*:*:*:*:*:*:*
cpe:2.3:a:sonatype:nexus_repository_manager:3.86.0:*:*:*:*:*:*:*
cpe:2.3:a:sonatype:nexus_repository_manager:3.86.2:*:*:*:*:*:*:*
cpe:2.3:a:sonatype:nexus_repository_manager:3.87.0:*:*:*:*:*:*:*
cpe:2.3:a:sonatype:nexus_repository_manager:3.87.1:*:*:*:*:*:*:*
Vendors & Products Sonatype
Sonatype nexus Repository Manager
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Sonatype Nexus Repository Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: Sonatype

Published:

Updated: 2026-01-15T14:43:42.991Z

Reserved: 2026-01-05T12:59:29.563Z

Link: CVE-2026-0601

cve-icon Vulnrichment

Updated: 2026-01-15T14:43:28.009Z

cve-icon NVD

Status : Deferred

Published: 2026-01-14T22:15:52.960

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0601

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T06:15:15Z

Weaknesses