Description
XSS vulnerability in cveInterface.js allows for inject HTML to be passed to display, as cveInterface trusts input from CVE API services
Published: 2026-04-02
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Client-side script execution
Action: Apply patch
AI Analysis

Impact

A stored XSS flaw in the script cveInterface.js allows injection of arbitrary HTML or JavaScript supplied by remote CVE API services. Because the interface trusts external data, an attacker can embed malicious code that will run in the context of users viewing CVE entries, potentially leading to malware execution, credential theft, or session hijacking. The flaw corresponds to CWE‑79, which describes insufficient input sanitization before rendering.

Affected Systems

The vulnerability affects CERT/CC’s cveClient, specifically the cveInterface.js component that processes CVE data from external APIs. No specific product or version numbers are listed, so any instance of this client that imports or executes the affected script may be impacted. It is advisable to review the source or deployment configuration to identify whether this code is in use.

Risk and Exploitability

The CVSS base score is 6.1, indicating moderate severity, while the EPSS score is below 1 %, suggesting low probability of exploitation in the wild. The vulnerability is not currently documented in the CISA KEV catalog. Exploitation requires an attacker to supply malicious input through a CVE API service; the client then renders this data without filtering, allowing the attacker to deliver cross‑site scripting payloads to other users. Given the medium score and low exploitation likelihood, organizations should still treat it as a notable risk, especially if the client is exposed to external data sources.

Generated by OpenCVE AI on April 3, 2026 at 17:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade cveClient to the latest release that sanitizes input from CVE API services.
  • If an upgrade is not yet available, modify cveInterface.js to escape or whitelist HTML before rendering.
  • Restrict the source of CVE data or validate incoming payloads to ensure they contain only safe content.
  • Regularly monitor the project’s repository for patches and security advisories.

Generated by OpenCVE AI on April 3, 2026 at 17:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Cert/cc
Cert/cc cveclient/cveinterface.js
Vendors & Products Cert/cc
Cert/cc cveclient/cveinterface.js

Thu, 02 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description XSS vulnerability in cveInterface.js allows for inject HTML to be passed to display, as cveInterface trusts input from CVE API services
Title Stored XSS via unsanitized input from remote service
Weaknesses CWE-79
References

Subscriptions

Cert/cc Cveclient/cveinterface.js
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2026-04-03T13:55:40.446Z

Reserved: 2026-04-02T20:09:50.057Z

Link: CVE-2026-35466

cve-icon Vulnrichment

Updated: 2026-04-03T13:53:25.522Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-02T21:16:40.687

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-35466

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:17:12Z

Weaknesses