Impact
A flaw in the MaxKB ChatHeadersMiddleware allows an attacker to manipulate the Name argument and inject arbitrary script code, resulting in cross‑site scripting. Remote exploitation is possible, meaning a remote user can trigger script execution in the victim’s browser. The vulnerability is identified as CWE‑79 for reflected XSS and CWE‑94 for potential code injection via input arguments.
Affected Systems
The vulnerability affects versions of 1Panel‑dev’s MaxKB product up to 2.6.1, specifically the middleware file apps/common/middleware/chat_headers_middleware.py. A fix is included in release 2.8.0, which removes the unchecked handling of the Name parameter.
Risk and Exploitability
The CVSS score of 5.1 classifies the issue as moderate. An EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, indicating it has not yet been widely exploited in the wild. Attackers would target the web‑facing interface, crafting a request that supplies a malicious Name value to the middleware; successful exploitation would allow arbitrary script execution in the context of the victim’s session, potentially leading to session hijacking, defacement, or data theft.
OpenCVE Enrichment