Description
Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, Mustache navigation templates interpolated configuration-controlled link values directly into href attributes without URL scheme validation. An administrator who could modify the navItems configuration could inject javascript: URIs, enabling stored cross-site scripting (XSS) against other authenticated users viewing the Emissary web interface. This vulnerability is fixed in 8.39.0.
Published: 2026-04-07
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The vulnerability in the Emissary workflow engine allows an administrator with permission to modify the navigation configuration (navItems) to embed javascript: URLs directly into link href attributes. Because the engine inserts these values without validating the URL scheme, the stored link can trigger an XSS attack when other authenticated users view the web interface. Attacks can compromise user sessions, theft of credentials, or execution of malicious actions in the user’s context.

Affected Systems

The flaw affects the National Security Agency’s Emissary platform prior to version 8.39.0. Any deployment using an earlier version that permits administrators to edit navItems is vulnerable. The affected product is the Emissary P2P workflow engine.

Risk and Exploitability

The CVSS score of 4.8 indicates a moderate risk level. An attacker would need administrative access to modify the navigation configuration, and there is no evidence that this flaw is listed in the CISA Known Exploited Vulnerabilities catalog or that a public exploit is available. The attack requires an authenticated administrator, so the likelihood of exploitation is limited to organizations that grant such privileges. Nevertheless, successful exploitation could lead to significant damage to confidentiality, integrity, and availability of affected users’ sessions.

Generated by OpenCVE AI on April 7, 2026 at 22:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Emissary to version 8.39.0 or later.
  • Verify that navItems configuration can only be edited by trusted administrators.
  • If an upgrade cannot be performed immediately, restrict administrator access to the navigation configuration until the patch is applied.

Generated by OpenCVE AI on April 7, 2026 at 22:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-cpm7-cfpx-3hvp Emissary has Stored XSS via Navigation Template Link Injection
History

Mon, 27 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Nsa
Nsa emissary
CPEs cpe:2.3:a:nsa:emissary:*:*:*:*:*:*:*:*
Vendors & Products Nsa
Nsa emissary

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Nationalsecurityagency
Nationalsecurityagency emissary
Vendors & Products Nationalsecurityagency
Nationalsecurityagency emissary

Wed, 08 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, Mustache navigation templates interpolated configuration-controlled link values directly into href attributes without URL scheme validation. An administrator who could modify the navItems configuration could inject javascript: URIs, enabling stored cross-site scripting (XSS) against other authenticated users viewing the Emissary web interface. This vulnerability is fixed in 8.39.0.
Title Emissary has Stored XSS via Navigation Template Link Injection
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Nationalsecurityagency Emissary
Nsa Emissary
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-08T14:57:05.392Z

Reserved: 2026-04-03T20:09:02.826Z

Link: CVE-2026-35571

cve-icon Vulnrichment

Updated: 2026-04-08T14:57:00.714Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T16:16:29.920

Modified: 2026-04-27T14:37:28.970

Link: CVE-2026-35571

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:48:13Z

Weaknesses