Description
Multiple stored cross-site scripting (XSS) vulnerabilities in the Edit feature of the Software Package List page of IngEstate Server v11.14.0 allow attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the About application, What's news, or Release note parameters.
Published: 2026-03-30
Score: 6.1 Medium
EPSS: n/a
KEV: No
Impact: Cross-site scripting allows arbitrary script execution in the web UI
Action: Patch
AI Analysis

Impact

The vulnerability exposes multiple stored cross‑site scripting weaknesses in the Edit feature of the Software Package List page of IngEstate Server v11.14.0. Attackers can embed malicious scripts or HTML into the About application, What’s news, or Release note fields, causing the browser to execute the injected code when the page is viewed by any user. This can lead to session hijacking, credential theft, or malicious actions carried out in the client’s browser context. The impact is limited to users who view the affected page, but because the payload is stored, any authenticated user who accesses the page may be compromised. The weakness is a classic stored XSS (CWE‑79) that does not require additional user interaction beyond viewing the page.

Affected Systems

The affected system is IngEstate Server, specifically version 11.14.0. The bug resides in the Edit functionality of the Software Package List page, where inputs for About application, What’s news, and Release notes are not properly sanitized before rendering. No other vendors or products are listed. The scope is confined to this application version and feature set.

Risk and Exploitability

The CVSS score of 6.1 reflects moderate severity; the vulnerability is not in the CISA KEV catalog. Exploitation is likely to require a user with access to the web interface to edit the Software Package List and inject a crafted payload. Once stored, the attacker can rely on end users visiting the page to trigger the payload, so the risk is primarily to confidentiality and integrity of user sessions and to the trust of the web UI. The expected attack vector is via the web interface, and no additional network or local privilege escalation is required.

Generated by OpenCVE AI on March 30, 2026 at 17:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest IngEstate Server update that addresses the stored XSS in the Software Package List Edit feature as soon as it becomes available.
  • If a patch is not yet released, restrict or disable the Edit functionality for all users or enforce strict input sanitization on the About application, What’s news, and Release note fields to strip or escape HTML tags.
  • Deploy a web application firewall rule or content‑security‑policy header that blocks or sanitizes suspicious script tags on the Software Package List page.
  • Monitor user accounts for signs of session hijack or credential theft and reset passwords if compromise is suspected.

Generated by OpenCVE AI on March 30, 2026 at 17:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Title Stored Cross‑Site Scripting in IngEstate Server Software Package List Edit Feature

Mon, 30 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Description Multiple stored cross-site scripting (XSS) vulnerabilities in the Edit feature of the Software Package List page of IngEstate Server v11.14.0 allow attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the About application, What's news, or Release note parameters.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-30T15:27:54.529Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30082

cve-icon Vulnrichment

Updated: 2026-03-30T15:27:49.269Z

cve-icon NVD

Status : Received

Published: 2026-03-30T15:16:26.320

Modified: 2026-03-30T16:16:05.040

Link: CVE-2026-30082

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:56:35Z

Weaknesses