Description
Workbench is a suite of tools for administrators and developers to interact with Salesforce.com organizations via the Force.com APIs. Prior to 65.0.0, Workbench contains a reflected cross-site scripting vulnerability via the footerScripts parameter, which does not sanitize user-supplied input before rendering it in the page response. Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Workbench allows XSS Targeting Error Pages. This vulnerability is fixed in 65.0.0.
Published: 2026-04-06
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross-site scripting that can hijack authenticated sessions
Action: Immediate Patch
AI Analysis

Impact

Workbench, a suite of tools for interacting with Salesforce.com, contains a reflected cross‑site scripting vulnerability in the footerScripts parameter. The input supplied via this parameter is inserted into the page response without proper neutralization, enabling an attacker to inject arbitrary JavaScript. Because the script runs within the user’s browser context, it can access session cookies or execute commands on behalf of the authenticated user, leading to session hijacking. The weakness is identified as CWE‑79 and is rated with a CVSS score of 5.1, indicating moderate severity.

Affected Systems

The flaw exists in all Force Workbench releases prior to version 65.0.0. Administrators and developers using any earlier build should verify the exact version of the Workbench package they have deployed and compare it with the advisory to determine if the installation is impacted.

Risk and Exploitability

The vulnerability is exploitable in a typical web environment via a crafted URL or posted data that includes a malicious footerScripts value. Although EPSS data is not available and the issue is not listed in the CISA KEV catalog, the moderate CVSS score combined with the ability to target authenticated sessions suggests a non‑negligible risk, especially for organizations that expose the Workbench interface to users with privileged Salesforce accounts.

Generated by OpenCVE AI on April 6, 2026 at 19:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Workbench update (65.0.0 or newer) to remove the reflected XSS flaw
  • If an immediate update is not feasible, restrict or sanitize the footerScripts parameter, removing any embedded script tags or encoding user input before rendering

Generated by OpenCVE AI on April 6, 2026 at 19:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Forceworkbench
Forceworkbench forceworkbench
Vendors & Products Forceworkbench
Forceworkbench forceworkbench

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Description Workbench is a suite of tools for administrators and developers to interact with Salesforce.com organizations via the Force.com APIs. Prior to 65.0.0, Workbench contains a reflected cross-site scripting vulnerability via the footerScripts parameter, which does not sanitize user-supplied input before rendering it in the page response. Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Workbench allows XSS Targeting Error Pages. This vulnerability is fixed in 65.0.0.
Title Reflected XSS in footer.php in Workbench Allows Attackers to Hijack Authenticated Sessions
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Forceworkbench Forceworkbench
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T14:18:59.617Z

Reserved: 2026-03-31T17:27:08.661Z

Link: CVE-2026-34951

cve-icon Vulnrichment

Updated: 2026-04-07T14:18:48.440Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-06T16:16:38.170

Modified: 2026-04-07T15:17:40.793

Link: CVE-2026-34951

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:31:47Z

Weaknesses