Description
Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Management Software v. 20230721a allows a remote attacker to execute arbitrary code via the function parameter.
Published: 2026-02-20
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch ASAP
AI Analysis

Impact

A cross‑site scripting flaw exists in Key Systems Inc Global Facilities Management Software version 20230721a. The vulnerability resides in a function that accepts user‑supplied parameters without adequate input validation or output encoding. An attacker can supply crafted input to inject malicious scripts, which are subsequently executed in the context of the application, leading to arbitrary code execution, credential theft, session hijacking, or further compromise of the underlying system. The flaw is identified as CWE‑79, a classic reflected or stored XSS weakness.

Affected Systems

The software product affected is Key Systems Inc Global Facilities Management Software, specifically the 20230721a release. No other vendors or versions are currently listed as impacted.

Risk and Exploitability

The vulnerability scores a CVSS of 8.2, indicating a high severity potential. The EPSS score is below 1 percent, suggesting that the overall exploitation probability is currently low, and the vulnerability is not present in the CISA KEV catalog. The likely attack vector is remote, through a web interface or API that accepts the vulnerable function parameter. If an attacker can inject a malicious payload, they may gain arbitrary code execution on the host machine or compromise other users. While the current exploitation likelihood is low, the high impact warrants prompt attention. Applying a patch or mitigation is advised.

Generated by OpenCVE AI on April 17, 2026 at 17:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor's security update that addresses the XSS flaw in the Global Facilities Management Software.
  • If an update is not yet available, sanitize all user‑supplied input to the vulnerable function and enforce proper output encoding before rendering to users.
  • Deploy a web application firewall and enable a strict content‑security‑policy header to mitigate reflected and stored XSS attempts.

Generated by OpenCVE AI on April 17, 2026 at 17:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Title Cross Site Scripting Vulnerability Allowing Remote Code Execution via Function Parameter

Thu, 26 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Keystorage
Keystorage global Facilities Management Software
CPEs cpe:2.3:a:keystorage:global_facilities_management_software:20230721a:*:*:*:*:*:*:*
Vendors & Products Keystorage
Keystorage global Facilities Management Software

Mon, 23 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Key Systems
Key Systems global Facilities Management Software
Vendors & Products Key Systems
Key Systems global Facilities Management Software

Fri, 20 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
Description Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Management Software v. 20230721a allows a remote attacker to execute arbitrary code via the function parameter.
References

Subscriptions

Key Systems Global Facilities Management Software
Keystorage Global Facilities Management Software
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-02-23T19:49:52.840Z

Reserved: 2026-02-16T00:00:00.000Z

Link: CVE-2026-26723

cve-icon Vulnrichment

Updated: 2026-02-23T19:49:27.924Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-20T17:25:55.483

Modified: 2026-02-26T17:55:24.573

Link: CVE-2026-26723

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T17:45:24Z

Weaknesses