Description
A stored cross-site scripting vulnerability has been found in the Talend Administration Center. An attacker with permission to manage servers can store a XSS payload that can be triggered by a different user.
Published: 2026-05-20
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A stored cross-site scripting vulnerability has been identified in the Talend Administration Center. An attacker who has permission to manage servers can embed a malicious XSS payload that is persisted by the application. When another user accesses the affected portion of the console, the payload executes in their browser, allowing the attacker to steal authentication tokens, inject malicious scripts, or manipulate the user interface. The weakness corresponds to CWE‑79, representing improper neutralization of input during web page generation.

Affected Systems

The vulnerability impacts Talend Administration Center, a product supplied by Talend. No specific version range is published in the CNA data; administrators should confirm whether their installation incorporates the fix referenced in the vendor advisory. Any installation that permits a server‑management role to persist data is potentially affected.

Risk and Exploitability

The CVSS base score of 5.4 indicates moderate severity. No EPSS score is provided, and the vulnerability is not listed in the CISA KEV catalog, suggesting limited evidence of exploitation. The attack requires the attacker to possess server‑management permissions to embed the payload; once stored, a different authenticated user becomes vulnerable when accessing the console. This implies that compromised privileged accounts or poorly controlled server‑management permissions present the main risk vectors. The lack of widespread exploitation evidence reduces the immediate threat, yet the potential impact on privileged users remains significant.

Generated by OpenCVE AI on May 20, 2026 at 06:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Talend Administration Center to a version that includes the XSS fix.
  • Limit server‑management permissions to a minimal set of trusted administrators.
  • Implement a content security policy and/or web application firewall to mitigate XSS execution.
  • Periodically review and sanitize any user‑generated content that is stored and displayed by the application.

Generated by OpenCVE AI on May 20, 2026 at 06:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 May 2026 06:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79

Wed, 20 May 2026 05:00:00 +0000

Type Values Removed Values Added
Description A stored cross-site scripting vulnerability has been found in the Talend Administration Center. An attacker with permission to manage servers can store a XSS payload that can be triggered by a different user.
Title Security fix for Qlik Talend Administration Center cross-site scripting vulnerability
First Time appeared Talend
Talend administration Center
CPEs cpe:2.3:a:talend:administration_center:*:*:*:*:*:*:*:*
Vendors & Products Talend
Talend administration Center
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Talend Administration Center
cve-icon MITRE

Status: PUBLISHED

Assigner: Bugcrowd

Published:

Updated: 2026-05-20T13:08:33.447Z

Reserved: 2026-05-20T04:33:36.038Z

Link: CVE-2026-9056

cve-icon Vulnrichment

Updated: 2026-05-20T13:08:30.365Z

cve-icon NVD

Status : Deferred

Published: 2026-05-20T05:16:23.350

Modified: 2026-05-20T14:04:18.950

Link: CVE-2026-9056

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T06:30:15Z

Weaknesses