Description
A stored cross-site scripting (XSS) vulnerability exists in the Altium Support Center AddComment endpoint due to missing server-side input sanitization. Although the client interface applies HTML escaping, the backend accepts and stores arbitrary HTML and JavaScript supplied via modified POST requests.

The injected content is rendered verbatim when support cases are viewed by other users, including support staff with elevated privileges, allowing execution of arbitrary JavaScript in the victim’s browser context.
Published: 2026-01-15
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via AddComment Endpoint
Action: Assess Impact
AI Analysis

Impact

A stored cross‑site scripting flaw is present in the Altium Live Support Center’s AddComment endpoint. The backend accepts and retains arbitrary HTML and JavaScript embedded in comment payloads because it does not perform server‑side sanitization, despite client‑side HTML escaping. When a support case is subsequently displayed to another user, including administrators, the unsanitized payload is rendered directly by the victim’s browser, allowing the attacker to execute arbitrary JavaScript in that user’s context. The impact is limited to the client’s browser; there is no host‑level code execution or data modification on the server, but the attacker can exfiltrate session data, inject malicious logic, or impersonate the victim within the support portal. This vulnerability is a classic example of a CWEs that involve improper output encoding (CWE‑79) and incorrect handling of content types (CWE‑116). It represents a medium severity flaw due to the requirement for the target to view the compromised case. The stored nature of the payload means that the vulnerability can be exploited repeatedly by injecting a single comment and waiting for others to view it. While the EPSS score of < 1 % indicates a low likelihood of current exploitation, the flaw remains publicly documented and is not listed in the CISA KEV catalog, so organizations using Altium Live should monitor for usage or apply the recommended mitigations.

Affected Systems

The affected product is Altium Live, specifically the AddComment endpoint within the Altium Live Support Center. The advisory does not specify a particular version number, implying that any deployment of Altium Live that exposes this endpoint without server‑side sanitization is vulnerable. Administrators and support staff who view support cases will be impacted when malicious content is stored, regardless of the specific release version.

Risk and Exploitability

An attacker can exploit this flaw by crafting a malicious POST request to the AddComment endpoint, inserting arbitrary script tags or event handlers into the comment content. The likely attack vector is web‑based: the attacker does not need privileged credentials beyond the ability to post a comment, and the injected code executes in the browser context of any user who later opens the affected support case. The CVSS base score of 6.1 reflects the medium impact, and the EPSS score of < 1 % suggests that real‑world exploitation is currently low, although the vulnerability is publicly known. The flaw is not associated with the KEV catalog, which indicates no known widespread exploitation, but the potential for social‐engineering or internal misuse keeps the risk relevant.

Generated by OpenCVE AI on April 18, 2026 at 19:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether Altium has released a patch or hotfix that implements server‑side sanitization for the AddComment endpoint; if available, apply the update immediately.
  • In the absence of a vendor fix, deploy an application‑layer filtering mechanism such as a web‑application firewall or API gateway to strip or neutralise dangerous content (e.g., <script> tags, event‑handler attributes) before comments are stored in the database.
  • Restrict comment posting privileges to trusted users or introduce a manual moderation workflow that reviews and sanitises comment content prior to storage, thereby limiting the amount of untrusted data entering the system.

Generated by OpenCVE AI on April 18, 2026 at 19:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 29 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Altium altium Live
CPEs cpe:2.3:a:altium:altium_live:*:*:*:*:*:*:*:*
Vendors & Products Altium altium Live

Mon, 19 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
Title Stored Cross-Site Scripting in Altium Support Center Comment Endpoint Stored Cross-Site Scripting in Altium Live Support Center Comment Endpoint

Fri, 16 Jan 2026 22:45:00 +0000

Type Values Removed Values Added
Title Stored Cross-Site Scripting in Altium Enterprise Server Support Center Comment Endpoint Stored Cross-Site Scripting in Altium Support Center Comment Endpoint

Fri, 16 Jan 2026 15:45:00 +0000

Type Values Removed Values Added
Title Stored Cross-Site Scripting in Altium Support Center Comment Endpoint Stored Cross-Site Scripting in Altium Enterprise Server Support Center Comment Endpoint

Fri, 16 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Altium
Altium altium 365
Vendors & Products Altium
Altium altium 365

Thu, 15 Jan 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}

cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Thu, 15 Jan 2026 23:30:00 +0000

Type Values Removed Values Added
Description A stored cross-site scripting (XSS) vulnerability exists in the Altium Support Center AddComment endpoint due to missing server-side input sanitization. Although the client interface applies HTML escaping, the backend accepts and stores arbitrary HTML and JavaScript supplied via modified POST requests. The injected content is rendered verbatim when support cases are viewed by other users, including support staff with elevated privileges, allowing execution of arbitrary JavaScript in the victim’s browser context.
Title Stored Cross-Site Scripting in Altium Support Center Comment Endpoint
Weaknesses CWE-116
CWE-79
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}


Subscriptions

Altium Altium 365 Altium Live
cve-icon MITRE

Status: PUBLISHED

Assigner: Altium

Published:

Updated: 2026-01-29T16:49:40.462Z

Reserved: 2026-01-15T22:08:48.882Z

Link: CVE-2026-1011

cve-icon Vulnrichment

Updated: 2026-01-29T16:35:23.184Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-16T00:16:29.050

Modified: 2026-01-23T20:26:55.737

Link: CVE-2026-1011

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T19:15:10Z

Weaknesses