Description
Pega Platform versions 8.1.0 through 25.1.1 are affected by an HTML Injection vulnerability in a user interface component. Requires a high privileged user with a developer role.
Published: 2026-04-15
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: HTML Injection (Cross‑Site Scripting)
Action: Mitigate
AI Analysis

Impact

Pega Platform versions 8.1.0 through 25.1.1 contain an HTML injection flaw in a user interface component that does not properly encode or sanitize user‑supplied data. The flaw allows an attacker who holds a high‑privileged developer account to inject arbitrary HTML, including JavaScript, into the platform’s web interface. If the injected content is rendered in a victim’s browser, it can execute in the context of the application, potentially providing ways for the attacker to perform actions such as session hijacking or data theft—these outcomes are typical for XSS but are not explicitly detailed in the advisory.

Affected Systems

The vulnerability affects the Pegasystems Pega Infinity product in any instance running a version between 8.1.0 and 25.1.1. Exploitation requires a developer role with high privileges; ordinary users or roles with lower privileges cannot trigger the injection.

Risk and Exploitability

The CVSS score of 5.1 indicates medium severity. While no public exploits have been reported and the vulnerability is not listed in the CISA KEV catalog, the requirement for a high‑privileged developer account reduces the chance of exploitation outside of environments where such accounts exist. Once the privilege threshold is met, an attacker could exploit the injected HTML to compromise confidentiality or integrity of the user session. Because an EPSS score is unavailable, the specific exploitation probability cannot be quantified, but the combination of medium CVSS and privileged requirement suggests a moderate overall risk.

Generated by OpenCVE AI on April 16, 2026 at 09:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Pega Infinity patch or upgrade to a version that removes the HTML injection flaw as released by Pega.
  • If a patch is not yet available, restrict the privileges of the developer role to only the necessary functionalities and disable any features that permit arbitrary HTML input for that role.
  • Implement a strict Content Security Policy on the web application to block the execution of injected scripts and enable input validation or output encoding to mitigate any residual injection risk.

Generated by OpenCVE AI on April 16, 2026 at 09:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Pega
Pega pega Platform
CPEs cpe:2.3:a:pega:pega_platform:*:*:*:*:*:*:*:*
Vendors & Products Pega
Pega pega Platform
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}


Thu, 16 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Pegasystems
Pegasystems pega Infinity
Vendors & Products Pegasystems
Pegasystems pega Infinity

Wed, 15 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description Pega Platform versions 8.1.0 through 25.1.1 are affected by an HTML Injection vulnerability in a user interface component. Requires a high privileged user with a developer role.
Title Pega Platform versions 8.1.0 through 25.1.1 are affected by an HTML Injection vulnerability in a user interface component. Requires a high privileged user with a developer role.
Weaknesses CWE-80
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Pega Pega Platform
Pegasystems Pega Infinity
cve-icon MITRE

Status: PUBLISHED

Assigner: Pega

Published:

Updated: 2026-04-16T14:16:54.925Z

Reserved: 2026-01-28T19:59:26.073Z

Link: CVE-2026-1564

cve-icon Vulnrichment

Updated: 2026-04-16T14:16:48.369Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-15T22:16:51.250

Modified: 2026-04-23T20:02:20.450

Link: CVE-2026-1564

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T09:15:30Z

Weaknesses