Description
oRPC is an tool that helps build APIs that are end-to-end type-safe and adhere to OpenAPI standards. Prior to version 1.13.9, a stored cross-site scripting (XSS) vulnerability exists in the OpenAPI documentation generation of orpc. If an attacker can control any field within the OpenAPI specification (such as info.description), they can break out of the JSON context and execute arbitrary JavaScript when a user views the generated API documentation. This issue has been patched in version 1.13.9.
Published: 2026-03-24
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting in API Documentation
Action: Immediate Patch
AI Analysis

Impact

A stored cross‑site scripting vulnerability exists in the OpenAPI documentation generation of orpc. When an attacker can insert arbitrary content into any field within the OpenAPI specification – for example, the info.description field – the sanitization used by the tool fails to escape the JSON.stringify output, allowing the attacker to break out of the JSON context and execute JavaScript when a user opens the generated API documentation.

Affected Systems

The affected product is orpc from the middleapi organization. All releases before version 1.13.9 are vulnerable because the issue was patched in the 1.13.9 release.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.2, indicating high severity. However, the EPSS score is below 1%, suggesting a low probability of exploitation in the wild. The vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. Exploitation requires the attacker to be able to modify the OpenAPI specification, which typically implies that the attacker has some level of access to the orpc configuration or file system. The attack vector is inferred to be a combination of privileged modification of the specification and a user viewing the documentation, so it is primarily a local or insider threat scenario.

Generated by OpenCVE AI on March 26, 2026 at 15:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade orpc to version 1.13.9 or newer.

Generated by OpenCVE AI on March 26, 2026 at 15:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7f6v-3gx7-27q8 oRPC has Stored XSS in OpenAPI Reference Plugin via unescaped JSON.stringify
History

Thu, 26 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Orpc
Orpc orpc
CPEs cpe:2.3:a:orpc:orpc:*:*:*:*:*:*:*:*
Vendors & Products Orpc
Orpc orpc

Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Middleapi
Middleapi orpc
Vendors & Products Middleapi
Middleapi orpc

Tue, 24 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description oRPC is an tool that helps build APIs that are end-to-end type-safe and adhere to OpenAPI standards. Prior to version 1.13.9, a stored cross-site scripting (XSS) vulnerability exists in the OpenAPI documentation generation of orpc. If an attacker can control any field within the OpenAPI specification (such as info.description), they can break out of the JSON context and execute arbitrary JavaScript when a user views the generated API documentation. This issue has been patched in version 1.13.9.
Title oRPC: Stored XSS in OpenAPI Reference Plugin via unescaped JSON.stringify
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-25T13:34:26.196Z

Reserved: 2026-03-18T22:15:11.811Z

Link: CVE-2026-33331

cve-icon Vulnrichment

Updated: 2026-03-25T13:34:14.962Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-03-24T20:16:28.547

Modified: 2026-03-26T13:26:24.360

Link: CVE-2026-33331

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:20:38Z

Weaknesses