Description
Insufficient sanitization of dashboard dashlet title links in Checkmk 2.2.0 (EOL), Checkmk 2.3.0 before 2.3.0p46, Checkmk 2.4.0 before 2.4.0p25, and Checkmk 2.5.0 (beta) before 2.5.0b3 allows an attacker with dashboard creation privileges to perform stored cross-site scripting (XSS) attacks by tricking a victim into clicking a crafted dashlet title link on a shared dashboard.
Published: 2026-04-07
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

The flaw exists because Checkmk does not properly sanitize the link titles embedded in dashboard dashlets. An attacker who can create or edit dashboards can store a malicious URL in the title field. When a user views a shared dashboard and clicks the crafted title, the browser executes the injected script, enabling the attacker to run arbitrary code in the victim’s browser. This stored cross‑site scripting propagates only through the shared dashboard view and relies on a user click to trigger the vulnerability.

Affected Systems

Checkmk GmbH’s Checkmk product is affected. The Vulnerable releases span Checkmk 2.2.0 (end‑of‑life), all releases of the 2.3 series before patch 2.3.0p46, all releases of the 2.4 series before patch 2.4.0p25, and the 2.5.0 beta line before patch 2.5.0b3. Administrators should verify whether their deployment falls within any of these ranges and note that only dashboard‑creation privileges are required to embed the exploit.

Risk and Exploitability

The CVSS base score of 8.5 categorises the vulnerability as high severity. No EPSS data is available and the issue is not listed in the CISA KEV catalog. Exploitation requires the attacker to have dashboard‑creation or editing rights and a victim to click the malicious title on a shared dashboard. Because the attack depends on a human action, it is a client‑side stored XSS that can be used to execute arbitrary scripts within the context of the victim’s browser but does not directly compromise the server itself.

Generated by OpenCVE AI on April 7, 2026 at 20:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Checkmk installation to 2.3.0p46 or later for the 2.3 series, to 2.4.0p25 or later for the 2.4 series, or to 2.5.0b3 or later for the beta line.
  • Restrict dashboard‑creation and editing permissions to trusted users only.
  • Limit the visibility of shared dashboards to internal or trusted audiences to reduce the exposure vector.

Generated by OpenCVE AI on April 7, 2026 at 20:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 08:45:00 +0000


Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Insufficient sanitization of dashboard dashlet title links in Checkmk 2.2.0 (EOL), Checkmk 2.3.0 before 2.3.0p46, Checkmk 2.4.0 before 2.4.0p25, and Checkmk 2.5.0 (beta) before 2.5.0b3 allows an attacker with dashboard creation privileges to perform stored cross-site scripting (XSS) attacks by tricking a victim into clicking a crafted dashlet title link on a shared dashboard.
Title Cross-site scripting in dashlet title
First Time appeared Checkmk
Checkmk checkmk
Weaknesses CWE-79
CPEs cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:*:*:*:*:*:*:*
Vendors & Products Checkmk
Checkmk checkmk
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:L/SA:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Checkmk

Published:

Updated: 2026-04-08T08:17:54.013Z

Reserved: 2026-03-03T09:09:01.487Z

Link: CVE-2026-3466

cve-icon Vulnrichment

Updated: 2026-04-07T13:18:44.039Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-07T13:16:47.150

Modified: 2026-04-08T09:16:44.793

Link: CVE-2026-3466

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:49:46Z

Weaknesses