Description
A vulnerability was determined in wandb OpenUI up to 1.0. Affected by this vulnerability is an unknown functionality of the file frontend/public/annotator/index.html of the component Window Message Event Handler. This manipulation causes cross site scripting. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-28
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Patch Now
AI Analysis

Impact

A flaw was identified in the Window Message Event handler of wandb OpenUI version 1.0 and earlier, located in frontend/public/annotator/index.html. The vulnerability allows an attacker to deliver crafted input that is processed by the handler, resulting in the injection of unintended scripts into the web page. Because the injected code runs in the context of the page, the flaw can let attackers execute arbitrary JavaScript in a user’s browser, potentially exposing data or altering page behavior.

Affected Systems

The affected product is wandb OpenUI, any installation running version 1.0 or earlier. Users who have not upgraded beyond this release are susceptible until an official fix is released.

Risk and Exploitability

The CVSS score of 5.1 suggests a moderate severity level. The exploit is capable of being triggered remotely, as an attacker only needs to supply a malicious message event to the vulnerable handler. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, but the public disclosure indicates that attackers are likely to craft and distribute malicious payloads that target the vulnerability.

Generated by OpenCVE AI on March 28, 2026 at 12:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the wandb website or repository for an updated OpenUI package that addresses the XSS flaw and upgrade immediately if one is available.
  • If a patch is not yet released, apply a defensive measure such as server‑side validation or sanitization of data processed by the Window Message Event handler to remove or escape potentially harmful characters.
  • Implement a strict Content Security Policy that disallows inline script execution and limits script sources to trusted origins.
  • If the Window Message Event functionality is not essential, consider disabling or removing it from the application.
  • Monitor application logs and user activity for signs of unintended script execution or abnormal URL patterns that may indicate an attempt to exploit the vulnerability.

Generated by OpenCVE AI on March 28, 2026 at 12:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 28 Mar 2026 11:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in wandb OpenUI up to 1.0. Affected by this vulnerability is an unknown functionality of the file frontend/public/annotator/index.html of the component Window Message Event Handler. This manipulation causes cross site scripting. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title wandb OpenUI Window Message Event index.html cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-28T10:45:10.750Z

Reserved: 2026-03-27T13:48:04.801Z

Link: CVE-2026-4995

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-28T11:16:36.060

Modified: 2026-03-28T11:16:36.060

Link: CVE-2026-4995

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-29T20:32:36Z

Weaknesses