Impact
Open OnDemand portals before versions 4.0.11, 4.1.5, and 4.2.2 allow specially crafted filenames to run JavaScript in the file browser. This injection flaw can give an attacker the ability to execute arbitrary scripts within the context of a logged‐in user. The consequence is code execution that can lead to credential theft, session hijacking, or further propagation if the user has elevated privileges. The weakness is a classic reflected or stored XSS (CWE‑79).
Affected Systems
This vulnerability affects the OSC:ondemand product, specifically all releases prior to 4.0.11, 4.1.5, and 4.2.2. Operators running those earlier versions are at risk, while newer releases contain the fix.
Risk and Exploitability
With a CVSS score of 5.3, the risk is moderate. No EPSS score is available and the flaw is not listed in CISA’s KEV catalog, suggesting limited current exploitation activity. The attack vector is inferred to be web‑based; a user who can interact with the file browser component, for example an authenticated web session, can supply a malicious filename to trigger the vulnerability.
OpenCVE Enrichment