Description
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the

list filter field that, when visited by another user, enables the attacker to execute commands with the target's permissions, including an administrator.

This issue affects all versions of Junos Space before 24.1R5 Patch V3.
Published: 2026-04-09
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: Cross‑Site Scripting leading to arbitrary code execution
Action: Immediate Patch
AI Analysis

Impact

This vulnerability arises from improper neutralization of input in the ilpFilter field on nLegacy.jsp of Juniper Networks Junos Space. An attacker can inject script tags into that field; when another user loads the resulting page, the injected script runs with that user’s permissions, potentially allowing the elevation of privileges up to an administrator. The impact is the execution of arbitrary client‑side code, which can be abused for malicious actions such as session hijacking, data exfiltration, or further compromise of the affected system.

Affected Systems

Juniper Networks Junos Space prior to release 24.1R5 Patch V3 is affected. All earlier versions of Junos Space contain the vulnerable ilpFilter field.

Risk and Exploitability

The CVSS score of 5.1 designates moderate severity, and the attack vector is a reflected XSS in a web interface. Based on the description, it is inferred that the attacker must supply a crafted link or form with the malicious payload, and a user with valid session credentials must subsequently visit that link for the exploit to succeed. Because the EPSS score is not available and the vulnerability is not listed in CISA’s KEV catalog, the likelihood of widespread exploitation remains uncertain, but the ability to gain administrator‑level code execution warrants prompt remediation.

Generated by OpenCVE AI on April 9, 2026 at 22:27 UTC.

Remediation

Vendor Solution

The following software releases have been updated to resolve this specific issue: 24.1R5 Patch V3, and all subsequent releases.


Vendor Workaround

There are no known workarounds for this issue.


OpenCVE Recommended Actions

  • Apply Juniper Networks Junos Space update 24.1R5 Patch V3 or later
  • Verify that the deployment is updated by checking release notes or configuration management systems
  • Monitor web traffic and application logs for suspicious script execution or XSS attempts
  • Review user access controls to limit privilege escalation if a breach occurs

Generated by OpenCVE AI on April 9, 2026 at 22:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Juniper Networks
Juniper Networks junos Space
Vendors & Products Juniper Networks
Juniper Networks junos Space

Thu, 09 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the list filter field that, when visited by another user, enables the attacker to execute commands with the target's permissions, including an administrator. This issue affects all versions of Junos Space before 24.1R5 Patch V3.
Title Junos Space: ilpFilter field on nLegacy.jsp is vulnerable to reflected cross-site script injection
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Juniper Networks Junos Space
cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2026-04-09T21:26:09.896Z

Reserved: 2026-01-05T17:32:48.709Z

Link: CVE-2026-21904

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-09T22:16:24.557

Modified: 2026-04-09T22:16:24.557

Link: CVE-2026-21904

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:28:47Z

Weaknesses