Impact
Hotspot configuration in Pannellum allows any attribute to be set, including HTML event handler attributes that execute JavaScript without user interaction. This flaw enables a cross‑site scripting attack where visiting a malicious viewer URL or loading a JSON configuration file can run arbitrary code, modify page content, and impersonate the hosting site. The vulnerability is identified as CWE‑79.
Affected Systems
The issue exists in Pannellum versions 2.5.6 through 3.5.0 inclusive, distributed by mpetroff. Any deployment using the standalone viewer HTML file or untrusted JSON configuration falls within the affected range.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, while the EPSS score of less than 1% suggests a low but non‑zero likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attacks can be launched simply by delivering a malicious hotspot configuration to visitors; no authentication or privileged access is required. The exploit path is straightforward: host the viewer, point it to a crafted configuration file, and observe the automatic execution of embedded JavaScript.
OpenCVE Enrichment
Github GHSA