Impact
A flaw exists in wandb's OpenUI component, specifically within the create_share and get_share routines located in backend/openui/server.py of the HTMLAnnotator module. By manipulating the value supplied for the ID parameter, an attacker can inject arbitrary HTML code that is rendered by the user interface. Because the injection can include script elements, the vulnerability amounts to cross‑site scripting, potentially allowing credential theft, defacement, or remote code execution from the victim’s browser. The weakness is identified as CWE‑79 and includes characteristics of code injection. The description confirms that the attack may be performed remotely and that an exploit has already been published.
Affected Systems
The vulnerability affects all releases of wandb OpenUI up through version 1.0. No mitigations have been provided by the vendor, and the component involved is the OpenUI server module. Systems running any sub‑1.0 build are potentially exposed to this flaw.
Risk and Exploitability
The measured severity is in the medium range as indicated by a CVSS score of 5.3. An exploit has already been available, and the flaw can be triggered over the internet. The attack requires only a crafted request to the share endpoint, with no local privilege escalation needed. Given that the endpoint is reachable from remote networks, the risk to deployed services is significant and the likelihood of exploitation is realistic.
OpenCVE Enrichment