Description
Cross-site Scripting (XSS) allows an attacker to submit specially crafted data to the application which is returned unaltered in the resulting web page.
Published: 2026-03-10
Score: 4.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Client Side Code Execution via Cross‑Site Scripting
Action: Monitor
AI Analysis

Impact

The vulnerability is a classic Cross‑Site Scripting flaw that allows an attacker to submit crafted input which is echoed back in the SiteMinder administrative web interface without proper sanitization. Because the data is displayed unchanged, a malicious payload can run in the browser of any user who views the affected page, enabling script execution, cookie theft, session hijacking, or UI manipulation. The weakness is identified as CWE‑79, and the CVSS score of 4.6 reflects low‑to‑moderate impact for attackers who can access the admin UI.

Affected Systems

Broadcom SiteMinder administrators using the web‑based management console are impacted. The advisory references the Broadcom product line without specifying affected releases, so all versions that expose the unvalidated input path within the administrative UI should be considered vulnerable until a fix is applied.

Risk and Exploitability

With an EPSS below 1% and no listing in the KEV catalog, public exploitation is currently improbable, but the existence of the flaw means that anyone with administrative login credentials or an ability to inject content into the UI can trigger the risk. Attackers would need to direct a compromised user to view the malicious page or gain a foothold in the admin console. The advisory does not provide an exploit example, so while the risk remains theoretical, the potential for client‑side compromise warrants ongoing monitoring and timely patching.

Generated by OpenCVE AI on April 16, 2026 at 09:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Broadcom SiteMinder patch or upgrade to a version that includes the XSS fix.
  • Configure the administrative UI to encode all user‑supplied data before rendering, ensuring outputs are properly escaped for HTML and JavaScript contexts.
  • Limit access to the SiteMinder management console to trusted administrators and enforce strong authentication to reduce the attack surface.
  • Deploy a web application firewall rule that detects and blocks typical XSS payload patterns entering the administrative UI.

Generated by OpenCVE AI on April 16, 2026 at 09:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Broadcom symantec Siteminder
CPEs cpe:2.3:a:broadcom:symantec_siteminder:*:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:symantec_siteminder:12.9:*:*:*:*:*:*:*
Vendors & Products Broadcom symantec Siteminder
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Broadcom
Broadcom siteminder
Vendors & Products Broadcom
Broadcom siteminder

Tue, 10 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Description Cross-site Scripting (XSS) allows an attacker to submit specially crafted data to the application which is returned unaltered in the resulting web page.
Title Cross-Site Scripting Vulnerability in SiteMinder Administrative UI
References
Metrics cvssV4_0

{'score': 4.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/AU:N/R:A/RE:M/U:Green'}


Subscriptions

Broadcom Siteminder Symantec Siteminder
cve-icon MITRE

Status: PUBLISHED

Assigner: symantec

Published:

Updated: 2026-03-10T15:40:24.948Z

Reserved: 2026-03-10T05:13:18.524Z

Link: CVE-2026-3862

cve-icon Vulnrichment

Updated: 2026-03-10T15:40:15.814Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T18:19:06.200

Modified: 2026-05-07T18:21:07.753

Link: CVE-2026-3862

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T10:00:14Z

Weaknesses