Description
A cross-site scripting (XSS) vulnerability in SketchUp 2026's Dynamic Components feature allows remote code execution and local file exfiltration through maliciously crafted SKP files. The vulnerability stems from improper input sanitization in the component options window, enabling attackers to execute arbitrary system commands and read local files without user interaction by exploiting an embedded Internet Explorer 11 browser.
Published: 2026-05-22
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A cross‑site scripting flaw exists in SketchUp 2026’s Dynamic Components feature that allows a maliciously crafted SKP file to embed JavaScript which is executed through an embedded Internet Explorer 11 browser. The vulnerability arises from improper input sanitization in the component options window. When a user opens such a file, the embedded script can run arbitrary system commands and read local files, effectively providing the attacker with remote code execution and local data exfiltration capabilities, all without the user needing to interact beyond opening the file.

Affected Systems

Trimble’s SketchUp 2026 product (the Dynamic Components feature). The issue affects any installation that includes this module.

Risk and Exploitability

The CVSS score for this vulnerability is 9.3, indicating high severity, while the EPSS score of < 1% suggests a low likelihood of exploitation. The vulnerability is not currently included in the CISA KEV catalog, suggesting that no widespread exploits are documented. Attackers would need to supply a malicious SKP file and entice a user to open it; no remote network access is required. Because the flaw allows execution of arbitrary system commands and local file reads, the potential impact on confidentiality, integrity, and availability is high for any affected system.

Generated by OpenCVE AI on May 22, 2026 at 19:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest SketchUp release from Trimble, which removes the vulnerable code path and implements proper input sanitization for Dynamic Components.
  • Run SketchUp under a non‑administrator user account to constrain the privileges that an exploitation could leverage.
  • Implement file‑level controls or digital‑signature checks to prevent the opening of untrusted SKP files, or otherwise restrict the import of dynamic components from external sources.
  • If the application permits configuration, disable or sandbox the embedded Internet Explorer 11 component to eliminate the execution environment for the injected script.

Generated by OpenCVE AI on May 22, 2026 at 19:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 18:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79

Fri, 22 May 2026 16:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 22 May 2026 03:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79

Fri, 22 May 2026 01:30:00 +0000

Type Values Removed Values Added
Description A cross-site scripting (XSS) vulnerability in SketchUp 2026's Dynamic Components feature allows remote code execution and local file exfiltration through maliciously crafted SKP files. The vulnerability stems from improper input sanitization in the component options window, enabling attackers to execute arbitrary system commands and read local files without user interaction by exploiting an embedded Internet Explorer 11 browser.
Title Cross-Site Scripting in SketchUp Dynamic Components
First Time appeared Trimble
Trimble sketchup
CPEs cpe:2.3:a:trimble:sketchup:*:*:*:*:*:*:*:*
Vendors & Products Trimble
Trimble sketchup
References

Subscriptions

Trimble Sketchup
cve-icon MITRE

Status: PUBLISHED

Assigner: Bugcrowd

Published:

Updated: 2026-05-22T15:52:45.358Z

Reserved: 2026-05-22T00:57:32.121Z

Link: CVE-2026-9264

cve-icon Vulnrichment

Updated: 2026-05-22T15:49:55.552Z

cve-icon NVD

Status : Received

Published: 2026-05-22T02:16:35.073

Modified: 2026-05-22T02:16:35.073

Link: CVE-2026-9264

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T19:30:44Z

Weaknesses