Description
SolarWinds Observability Self-Hosted was found to be affected by a stored cross-site scripting vulnerability, which when exploited, can lead to unintended script execution.
Published: 2026-03-26
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting allowing unintended script execution
Action: Patch
AI Analysis

Impact

A stored cross‑site scripting vulnerability exists within SolarWinds Observability Self‑Hosted. The flaw enables the insertion of malicious JavaScript that is saved and subsequently delivered to other users who view the affected content. This can result in unintended script execution, exposing users to potential phishing, credential theft, or other client‑side attacks. The weakness originates from an input validation flaw that fails to properly sanitize user input before storage and rendering.

Affected Systems

SolarWinds Observability Self‑Hosted is affected. No specific patch or version numbers are provided in the data, but the vulnerability was disclosed in relation to the 2026‑1‑1 release. Users should verify that they are running a version newer than the one identified as vulnerable.

Risk and Exploitability

The CVSS score of 5.9 indicates a moderate risk, while the EPSS score of less than 1 % suggests a low chance of active exploitation observed in the wild. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, further indicating limited exploitation. The attack vector is inferred to be through the platform’s data entry or configuration interfaces, requiring an attacker to inject malicious payloads that are then stored and rendered to other authenticated users. No additional prerequisites or conditions are detailed, but successful exploitation likely depends on the target’s user permissions.

Generated by OpenCVE AI on March 31, 2026 at 15:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest SolarWinds Observability Self‑Hosted patch or upgrade to a version that contains the fix.

Generated by OpenCVE AI on March 31, 2026 at 15:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:solarwinds:observability_self-hosted:*:*:*:*:*:*:*:*

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Solarwinds
Solarwinds observability Self-hosted
Vendors & Products Solarwinds
Solarwinds observability Self-hosted

Thu, 26 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Description SolarWinds Observability Self-Hosted was found to be affected by a stored cross-site scripting vulnerability, which when exploited, can lead to unintended script execution.
Title SolarWinds Observability Self-Hosted Stored Cross-Site Scripting Vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N'}


Subscriptions

Solarwinds Observability Self-hosted
cve-icon MITRE

Status: PUBLISHED

Assigner: SolarWinds

Published:

Updated: 2026-03-27T03:55:35.745Z

Reserved: 2026-02-26T14:15:09.403Z

Link: CVE-2026-28298

cve-icon Vulnrichment

Updated: 2026-03-26T15:16:27.129Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T15:16:34.710

Modified: 2026-03-31T14:14:55.273

Link: CVE-2026-28298

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:09:03Z

Weaknesses