Description
Kiteworks is a private data network (PDN). Prior to version 9.2.0, a vulnerability in Kiteworks Email Protection Gateway allows authenticated administrators to inject malicious scripts through a configuration interface. The stored script executes when users interact with the affected user interface. Version 9.2.0 contains a patch for the issue.
Published: 2026-02-27
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross‑site scripting enabling malicious script execution by authenticated administrators
Action: Immediate Patch
AI Analysis

Impact

Kiteworks Email Protection Gateway contains a stored cross‑site scripting flaw that permits authenticated administrators to embed malicious scripts via a configuration interface. When end users interact with the affected UI, the injected script executes within the user’s browser. The vulnerability is categorized as CWE‑79 and carries a CVSS score of 8.1, reflecting a high‑severity risk to confidentiality and integrity.

Affected Systems

The issue affects all Kiteworks Email Protection Gateway installations running any version earlier than 9.2.0. Administrators with valid credentials can use the configuration interface to inject scripts, while the risk extends to any user who interacts with the compromised UI. Upgrading to version 9.2.0 or later removes the vulnerability.

Risk and Exploitability

With a CVSS score of 8.1, the flaw represents significant potential impact, yet its EPSS score of less than 1 % indicates a currently low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog, suggesting no widespread exploitation has been recorded. Based on the description, it is inferred that the attack vector requires an authenticated administrator session accessing the configuration interface, as the vulnerability exploits the application’s failure to sanitize input and a lack of protective content‑security policy.

Generated by OpenCVE AI on April 18, 2026 at 10:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Kiteworks 9.2.0 or newer to apply the vendor‑supplied patch
  • Deploy a strict Content Security Policy on the administration portal to block inline script execution
  • Revoke or rotate any unused administrative credentials and enforce least‑privilege access until the patch is in place

Generated by OpenCVE AI on April 18, 2026 at 10:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Accellion
Accellion kiteworks
CPEs cpe:2.3:a:accellion:kiteworks:*:*:*:*:*:*:*:*
Vendors & Products Accellion
Accellion kiteworks

Tue, 03 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Kiteworks
Kiteworks security-advisories
Vendors & Products Kiteworks
Kiteworks security-advisories

Fri, 27 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
Description Kiteworks is a private data network (PDN). Prior to version 9.2.0, a vulnerability in Kiteworks Email Protection Gateway allows authenticated administrators to inject malicious scripts through a configuration interface. The stored script executes when users interact with the affected user interface. Version 9.2.0 contains a patch for the issue.
Title Kiteworks Email Protection Gateway has a Cross-site Scripting vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N'}


Subscriptions

Accellion Kiteworks
Kiteworks Security-advisories
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-03T20:27:59.264Z

Reserved: 2026-02-26T01:52:58.733Z

Link: CVE-2026-28272

cve-icon Vulnrichment

Updated: 2026-03-03T20:27:56.376Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T21:16:18.703

Modified: 2026-03-04T19:48:26.303

Link: CVE-2026-28272

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T10:15:25Z

Weaknesses