Description
The Tarkov Data Manager is a tool to manage the Tarkov item data. Prior to 02 January 2025, a reflected Cross Site Scripting (XSS) vulnerability in the toast notification system allows any attacker to execute arbitrary JavaScript in the context of a victim's browser session by crafting a malicious URL. A series of fix commits on 02 January 2025 fixed this and other vulnerabilities.
Published: 2026-01-07
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (Reflected XSS)
Action: Patch
AI Analysis

Impact

A reflected Cross‑Site Scripting flaw in the toast‑notification component of Tarkov Data Manager allows any attacker to embed malicious JavaScript that runs in the victim’s browser context when a crafted URL is opened. The vulnerability is a classic input‑validation weakness (CWE‑79) and satisfies the unauthenticated criterion, meaning the attacker does not need to authenticate or control the victim’s system. With this capability an attacker could steal session cookies, hijack accounts, or perform further phishing attacks against users without requiring direct access to the device.

Affected Systems

The issue affects the Tarkov Data Manager application provided by the-hideout, as identified by its CPE, for all releases prior to the comprehensive fixes committed on 2 January 2025. All users running those earlier versions are potentially exploitable.

Risk and Exploitability

The CVSS score of 9.3 signals a high severity that grants attackers full control over the victim’s browser session. However, the EPSS score of less than 1% indicates that, as of now, exploitation is rare. The vulnerability is not present in the CISA KEV catalog, suggesting no confirmed exploitation reports. An attacker can launch an attack by simply embedding the malicious URL, for example in an email or webpage, and inviting a user to click it. When a user opens the link, the malicious script executes with the same privileges as the user’s browser context, enabling the attacker to compromise any data or credentials accessible to the victim’s session.

Generated by OpenCVE AI on April 18, 2026 at 16:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest release of Tarkov Data Manager (2 January 2025 or later) to remove the vulnerable toast‑notification code.
  • If an update is not immediately possible, avoid opening links from untrusted sources and disable or remove the toast‑notification feature in the application's settings to eliminate the reflected XSS vector.
  • Enforce a robust Content Security Policy that restricts inline scripts and disallows execution of data‑scheme URLs to provide a secondary mitigation against script execution within the application.

Generated by OpenCVE AI on April 18, 2026 at 16:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 03 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Tarkov
Tarkov tarkov Data Manager
CPEs cpe:2.3:a:tarkov:tarkov_data_manager:*:*:*:*:*:*:*:*
Vendors & Products Tarkov
Tarkov tarkov Data Manager

Wed, 07 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 18:30:00 +0000

Type Values Removed Values Added
Description The Tarkov Data Manager is a tool to manage the Tarkov item data. Prior to 02 January 2025, a reflected Cross Site Scripting (XSS) vulnerability in the toast notification system allows any attacker to execute arbitrary JavaScript in the context of a victim's browser session by crafting a malicious URL. A series of fix commits on 02 January 2025 fixed this and other vulnerabilities.
Title Tarkov Data Manager has Unauthenticated Reflected XSS
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}


Subscriptions

Tarkov Tarkov Data Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-07T18:37:42.582Z

Reserved: 2026-01-05T16:44:16.366Z

Link: CVE-2026-21855

cve-icon Vulnrichment

Updated: 2026-01-07T18:37:31.903Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-07T19:15:57.970

Modified: 2026-02-03T16:20:50.047

Link: CVE-2026-21855

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T17:00:05Z

Weaknesses