Description
Cockpit CMS through version 2.14.0, patched in commit 72a83fc, contains a stored cross-site scripting vulnerability in the Set field type's Display template option, where the template string is processed by the $interpolate function using new Function() and rendered via Vue's v-html directive without sanitization. An attacker with content/:models/manage permission can inject arbitrary JavaScript into the Display template, which executes in the browser of any user viewing the collection items list.
Published: 2026-05-15
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Cockpit CMS up to and including version 2.14.0 stores an unescaped value supplied to a Set field type’s Display template option. The template string is processed by a JavaScript interpolate function that compiles the content with new Function() and then is rendered via Vue’s v‑html directive without sanitization. An attacker with the content/:models/manage permission can inject arbitrary JavaScript into that template, causing the code to run in the browser context of every user who views the corresponding collection items list. The impact is the theft of cookies or other browser‑side secrets, manipulation of page content, or execution of arbitrary actions on behalf of the logged‑in user.

Affected Systems

The vulnerability affects Cockpit CMS version 2.14.0 and earlier. The patch provided in commit 72a83fc addresses the issue; upgrading past 2.14.0 or applying that commit resolves the flaw.

Risk and Exploitability

The CVSS score of 5.1 indicates a moderate severity. No EPSS score is publicly available, and the vulnerability is not listed in CISA’s KEV catalog, suggesting no known widespread exploits. However, the requirement of content/:models/manage permission means an attacker must be authenticated with that capability; once granted, the XSS can be used by any user who subsequently views the affected collection items. Internal attackers or compromised accounts with the necessary permission represent the most realistic threat vectors.

Generated by OpenCVE AI on May 15, 2026 at 18:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the patch included in commit 72a83fc or upgrade to a Cockpit CMS version later than 2.14.0.
  • Restrict the content/:models/manage permission to only trusted administrators and remove it from general editor or contributor roles.
  • Disable or remove the ability to define Set field Display templates for untrusted users; alternatively, enforce input sanitization for template strings prior to rendering.

Generated by OpenCVE AI on May 15, 2026 at 18:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Cockpit-hq
Cockpit-hq cockpit
Vendors & Products Cockpit-hq
Cockpit-hq cockpit

Fri, 15 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 17:15:00 +0000

Type Values Removed Values Added
Description Cockpit CMS through version 2.14.0, patched in commit 72a83fc, contains a stored cross-site scripting vulnerability in the Set field type's Display template option, where the template string is processed by the $interpolate function using new Function() and rendered via Vue's v-html directive without sanitization. An attacker with content/:models/manage permission can inject arbitrary JavaScript into the Display template, which executes in the browser of any user viewing the collection items list.
Title Cockpit CMS 2.14.0 Stored XSS via Set Field Display Template
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Cockpit-hq Cockpit
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-15T17:40:59.046Z

Reserved: 2026-01-14T22:02:15.208Z

Link: CVE-2026-23695

cve-icon Vulnrichment

Updated: 2026-05-15T17:40:50.508Z

cve-icon NVD

Status : Received

Published: 2026-05-15T17:16:45.673

Modified: 2026-05-15T17:16:45.673

Link: CVE-2026-23695

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T19:30:05Z

Weaknesses