Description
Insufficient sanitization of dashboard dashlet title links in Checkmk 2.2.0 (EOL), Checkmk 2.3.0 before 2.3.0p46, Checkmk 2.4.0 before 2.4.0p25, and Checkmk 2.5.0 (beta) before 2.5.0 allows an attacker with dashboard creation privileges to perform stored cross-site scripting (XSS) attacks by tricking a victim into clicking a crafted dashlet title link on a shared dashboard.
Published: 2026-04-07
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross‑site scripting (XSS) via malicious dashlet title links
Action: Immediate Patch
AI Analysis

Impact

Insufficient sanitization of links embedded in dashboard dashlet titles allows an attacker with dashboard‑creation privileges to store a malicious URL. When a victim visits the shared dashboard and clicks the crafted link, the attacker's script executes in the victim’s browser, potentially stealing session information, defacing the interface or performing other malicious client‑side actions. The vulnerability is a classic stored XSS and can be leveraged to compromise user accounts and further spread attacks inside the organization.

Affected Systems

The flaw affects Checkmk version 2.2.0 (end‑of‑life), Checkmk 2.3.0 prior to 2.3.0p46, Checkmk 2.4.0 prior to 2.4.0p25, and Checkmk 2.5.0 (beta) prior to the first update; it is specific to the application delivered by Checkmk GmbH.

Risk and Exploitability

The CVSS score of 8.5 classifies the issue as high severity. EPSS is below 1 %, indicating that large‑scale exploitation is not common, and the vulnerability is not listed in the CISA KEV catalogue. Exploitation requires an attacker to create a malicious dashboard and a victim with access to the shared dashboard who clicks the injected link. The attack vector is client‑side; however, once the victim clicks, the attacker gains full client‑side control. Consequently, the risk to an organization that permits dashboard creation by multiple users is non‑negligible and warrants swift remediation.

Generated by OpenCVE AI on April 22, 2026 at 15:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Checkmk release: upgrade to 2.3.0p46 or later, 2.4.0p25 or later, or the newest 2.5.0 beta or stable release; any newer version is acceptable.
  • If an upgrade is not immediately possible, restrict permission to create dashboards to a minimal set of trusted administrators and audit dashboard changes.
  • Consider removing or disabling the ability to use hyperlink markup in dashlet titles during the interim.
  • Monitor user activity for unexpected dashboard edits and validate that shared dashboards do not contain unfamiliar links.
  • Stay informed of vendor advisories and verify that the applied patch addresses the XSS issue.

Generated by OpenCVE AI on April 22, 2026 at 15:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 12:45:00 +0000

Type Values Removed Values Added
Description Insufficient sanitization of dashboard dashlet title links in Checkmk 2.2.0 (EOL), Checkmk 2.3.0 before 2.3.0p46, Checkmk 2.4.0 before 2.4.0p25, and Checkmk 2.5.0 (beta) before 2.5.0b3 allows an attacker with dashboard creation privileges to perform stored cross-site scripting (XSS) attacks by tricking a victim into clicking a crafted dashlet title link on a shared dashboard. Insufficient sanitization of dashboard dashlet title links in Checkmk 2.2.0 (EOL), Checkmk 2.3.0 before 2.3.0p46, Checkmk 2.4.0 before 2.4.0p25, and Checkmk 2.5.0 (beta) before 2.5.0 allows an attacker with dashboard creation privileges to perform stored cross-site scripting (XSS) attacks by tricking a victim into clicking a crafted dashlet title link on a shared dashboard.
References

Tue, 14 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p33:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p34:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p35:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p36:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p37:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p38:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p39:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p40:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p41:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p42:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p43:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p44:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p45:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p46:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p47:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:b5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:b6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p32:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p33:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p34:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p35:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p36:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p37:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p38:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p39:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p40:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p41:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p42:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p43:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p44:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p45:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:b2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:b4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:b5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:b6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p16:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p17:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p18:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p19:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p20:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p21:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p22:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p23:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p24:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.5.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.5.0:b2:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Wed, 08 Apr 2026 08:45:00 +0000


Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Insufficient sanitization of dashboard dashlet title links in Checkmk 2.2.0 (EOL), Checkmk 2.3.0 before 2.3.0p46, Checkmk 2.4.0 before 2.4.0p25, and Checkmk 2.5.0 (beta) before 2.5.0b3 allows an attacker with dashboard creation privileges to perform stored cross-site scripting (XSS) attacks by tricking a victim into clicking a crafted dashlet title link on a shared dashboard.
Title Cross-site scripting in dashlet title
First Time appeared Checkmk
Checkmk checkmk
Weaknesses CWE-79
CPEs cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:*:*:*:*:*:*:*
Vendors & Products Checkmk
Checkmk checkmk
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:L/SA:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Checkmk

Published:

Updated: 2026-04-22T12:26:27.839Z

Reserved: 2026-03-03T09:09:01.487Z

Link: CVE-2026-3466

cve-icon Vulnrichment

Updated: 2026-04-07T13:18:44.039Z

cve-icon NVD

Status : Modified

Published: 2026-04-07T13:16:47.150

Modified: 2026-04-22T13:16:20.263

Link: CVE-2026-3466

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T15:30:20Z

Weaknesses