Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in misp allows Stored XSS.






This issue affects MISP before 2.5.37.




A stored cross-site scripting vulnerability exists in the template element attribute handling logic. The application accepted arbitrary values for the TemplateElementAttribute type and category fields without validating them against the known MISP attribute type and category definitions. An attacker with permission to create or modify template element attributes could store a crafted type value.


This affects the old templating (not more accessible in 2.5.37) engine from MISP which will be removed in 2.5.38
Published: 2026-05-07
Score: 6.8 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A stored cross‑site scripting vulnerability exists in MISP’s legacy templating engine. The engine accepts arbitrary values for template element attribute type and category fields without validating them against the known MISP attribute type and category definitions. An attacker with permission to create or modify template element attributes can store a crafted value that results in malicious JavaScript being injected into pages viewed by other users, enabling session hijacking, credential theft, or other malicious actions performed in the victim’s browser.

Affected Systems

All installations of MISP core with a version older than 2.5.37 that use the legacy templating engine are affected. The vulnerable code resides in the old template element attribute handling logic, which the product removes in version 2.5.38.

Risk and Exploitability

The CVSS score of 6.8 indicates moderate severity. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog, suggesting limited publicly known exploitation. Exploitation requires that an attacker be authenticated and have permission to create or modify template element attributes; no additional prerequisites are needed. Once the permission is granted, the attacker can inject malicious code that will be rendered whenever an affected page is loaded by any user. Because the flaw depends on privileged credentials and is not widespread, organizations with strict role‑based access controls may mitigate the risk by restricting template editing rights.

Generated by OpenCVE AI on May 7, 2026 at 15:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade MISP to version 2.5.38 or later, which removes the vulnerable legacy templating engine
  • Restrict template element attribute creation or modification to trusted administrators only
  • If an upgrade cannot be performed immediately, disable the legacy templating engine or remove its configuration to prevent its use

Generated by OpenCVE AI on May 7, 2026 at 15:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Misp
Misp misp
Vendors & Products Misp
Misp misp
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 07 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in misp allows Stored XSS. This issue affects MISP before 2.5.37. A stored cross-site scripting vulnerability exists in the template element attribute handling logic. The application accepted arbitrary values for the TemplateElementAttribute type and category fields without validating them against the known MISP attribute type and category definitions. An attacker with permission to create or modify template element attributes could store a crafted type value. This affects the old templating (not more accessible in 2.5.37) engine from MISP which will be removed in 2.5.38
Title MISP core - Stored XSS in MISP template (old engine) element attribute type
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/U:Green'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CIRCL

Published:

Updated: 2026-05-07T14:57:26.231Z

Reserved: 2026-05-07T12:05:55.978Z

Link: CVE-2026-8080

cve-icon Vulnrichment

Updated: 2026-05-07T14:47:13.377Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-07T12:16:18.467

Modified: 2026-05-07T14:52:27.380

Link: CVE-2026-8080

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T15:30:06Z

Weaknesses