Impact
Workbench, a Salesforce integration tool, has a reflected XSS flaw in footer.php triggered by the footerScripts parameter. The input is not sanitized before rendering in the page response, allowing an attacker to inject arbitrary JavaScript that executes in the context of any authenticated user that visits the crafted URL. This Javascript can steal session cookies or perform other malicious actions, effectively hijacking the user’s session.
Affected Systems
The vulnerability affects the Workbench suite provided by forceworkbench for interacting with Salesforce.com. Versions prior to 65.0.0 are impacted. Users running any older release should treat the system as vulnerable.
Risk and Exploitability
The CVSS score of 5.1 indicates a moderate severity, while the EPSS score is below 1% and the issue is not listed in KEV, suggesting it is not widely exploited yet. The attack path requires a malicious link containing a crafted footerScripts value that an authenticated user will click. Once executed, the injected script gains the privileges of the victim user, allowing session hijack and potential further attacks.
OpenCVE Enrichment