Description
A vulnerability was determined in UEditor up to 1.4.3.2. This issue affects some unknown processing of the file php/controller.php?action=uploadimage of the component JSONP Callback Handler. This manipulation of the argument callback causes cross site scripting. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-03-15
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (XSS)
Action: Assess Impact
AI Analysis

Impact

UEditor versions up to 1.4.3.2 are vulnerable to cross‑site scripting due to improper validation of the "callback" query argument in the JSONP callback handler (controller.php?action=uploadimage). An attacker can supply a crafted callback value that leads to arbitrary script execution in a victim's browser. The vulnerability is a classic XSS flaw (CWE‑79). No evidence of remote code execution or privilege escalation is provided in the description.

Affected Systems

Affected vendors: UEditor. Affected product versions: any version up to and including 1.4.3.2. These versions are no longer supported by the maintainer, so no official patch is provided by the vendor.

Risk and Exploitability

The CVSS score 5.1 indicates moderate severity, while the EPSS score of less than 1% suggests exploitation likelihood is low. The vulnerability can be triggered remotely via a crafted URL, and public exploit code is available. The vulnerability is currently not listed in the CISA KEV catalog, implying it may not be widely exploited in the wild yet.

Generated by OpenCVE AI on March 17, 2026 at 16:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the UEditor version in use; ensure it is not v1.4.3.2 or earlier.
  • If an affected version is in use, update to a supported and patched UEditor release or apply any vendor‑released fix when available.
  • If the upgrade is not possible, restrict or remove access to the controller.php endpoint or disable the JSONP callback feature to block the injection vector.
  • Continually monitor vendor advisories and apply future patches as they appear.

Generated by OpenCVE AI on March 17, 2026 at 16:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Ueditor
Ueditor ueditor
Vendors & Products Ueditor
Ueditor ueditor

Sun, 15 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in UEditor up to 1.4.3.2. This issue affects some unknown processing of the file php/controller.php?action=uploadimage of the component JSONP Callback Handler. This manipulation of the argument callback causes cross site scripting. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer.
Title UEditor JSONP Callback controller.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-17T15:19:44.695Z

Reserved: 2026-03-14T22:04:07.676Z

Link: CVE-2026-4186

cve-icon Vulnrichment

Updated: 2026-03-17T15:19:39.235Z

cve-icon NVD

Status : Deferred

Published: 2026-03-16T14:19:59.967

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-4186

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:01:17Z

Weaknesses