Description
Home Assistant is open source home automation software that puts local control and privacy first. Starting in version 2020.02 and prior to version 2026.01, an authenticated party can add a malicious name to their device entity, allowing for Cross-Site Scripting attacks against anyone who can see a dashboard with a Map-card which includes that entity. It requires that the victim hovers over an information point. Version 2026.01 fixes the issue.
Published: 2026-03-27
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting via device name in Map‑card
Action: Apply Patch
AI Analysis

Impact

An authenticated user can inject malicious JavaScript into the name of a device entity in Home Assistant. When the edited device appears on a dashboard that contains a Map‑card, the script executes in the browser of any user who views the card. This can hijack the user session, steal session cookies, or perform actions on behalf of the victim. The flaw is a stored Cross‑Site Scripting vulnerability (CWE‑79) that compromises confidentiality, integrity, and availability of user sessions.

Affected Systems

All Home Assistant core installations from release 2020.02 up to, but not including, 2026.01 are vulnerable. The issue resides in the map‑card component that displays devices on the dashboard. Installations that allow authenticated users to add or modify device names are at risk because the malicious name is stored and later rendered to others who view the dashboard.

Risk and Exploitability

With a CVSS score of 7.3, the vulnerability falls into the high‑severity range. Exploitation requires legitimate authentication and the victim to view a dashboard containing the malicious device; hovering over the device icon triggers the exploit. While it does not allow remote code execution on the host, the impact on user accounts can be significant. EPSS data is unavailable and the flaw has not yet appeared in the CISA KEV catalog. Nonetheless, authenticated social engineering and the potential for widespread dashboard exposure make this a concrete threat for installations with broad user privileges.

Generated by OpenCVE AI on March 27, 2026 at 21:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Home Assistant to version 2026.01 or newer.

Generated by OpenCVE AI on March 27, 2026 at 21:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-r584-6283-p7xc Home Assistant has stored XSS in Map-card through malicious device name
History

Tue, 31 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Home-assistant home-assistant
CPEs cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*
Vendors & Products Home-assistant home-assistant
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Home-assistant
Home-assistant core
Vendors & Products Home-assistant
Home-assistant core

Fri, 27 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Description Home Assistant is open source home automation software that puts local control and privacy first. Starting in version 2020.02 and prior to version 2026.01, an authenticated party can add a malicious name to their device entity, allowing for Cross-Site Scripting attacks against anyone who can see a dashboard with a Map-card which includes that entity. It requires that the victim hovers over an information point. Version 2026.01 fixes the issue.
Title Home Assistant has stored XSS in Map-card through malicious device name
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P'}


Subscriptions

Home-assistant Core Home-assistant
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-31T13:50:59.895Z

Reserved: 2026-03-17T18:10:50.211Z

Link: CVE-2026-33044

cve-icon Vulnrichment

Updated: 2026-03-31T13:50:55.726Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T20:16:30.980

Modified: 2026-03-31T15:42:30.977

Link: CVE-2026-33044

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T07:00:40Z

Weaknesses