Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1079: CWE-284: Improper Access Control in Pegasystems Pega Browser Extension (PBE)

0
Medium
VulnerabilityCVE-2026-1079cvecve-2026-1079cwe-284
Published: Tue Apr 07 2026 (04/07/2026, 15:17:47 UTC)
Source: CVE Database V5
Vendor/Project: Pegasystems
Product: Pega Browser Extension (PBE)

Description

CVE-2026-1079 is a medium severity vulnerability in the Pega Browser Extension (PBE) used by Pega Robotic Automation. It involves improper access control in the native messaging host component, allowing a malicious website to trigger an unexpected message box if a user visits it. This vulnerability requires user interaction (navigating to the malicious site) and does not involve privilege requirements or confidentiality/integrity/availability impacts beyond the message box behavior. No official patch or remediation guidance is currently available from the vendor.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/14/2026, 15:53:34 UTC

Technical Analysis

This vulnerability (CWE-284: Improper Access Control) affects all versions of Pega Browser Extension integrated with Pega Robotic Automation. A malicious website can exploit the native messaging host interface to cause an unexpected message box to appear when a user visits the site. The CVSS 4.0 score is 6.0 (medium), reflecting network attack vector, low attack complexity, no privileges required, user interaction required, and high impact on availability. No known exploits are reported in the wild, and no vendor remediation or patch has been published as of the current data.

Potential Impact

The impact is limited to the presentation of an unexpected message box triggered by visiting a malicious website. There is no indication of data confidentiality, integrity, or broader availability compromise. The vulnerability could cause user confusion or potential social engineering but does not directly lead to system compromise based on the provided information.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, users should exercise caution when visiting untrusted websites, especially if they have the Pega Browser Extension installed. Monitor vendor communications for updates on patches or mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Pega
Date Reserved
2026-01-16T20:29:58.229Z
Cvss Version
4.0
State
PUBLISHED
Remediation Level
null

Threat ID: 69d52341aaed68159a2ec570

Added to database: 4/7/2026, 3:31:13 PM

Last enriched: 4/14/2026, 3:53:34 PM

Last updated: 5/22/2026, 11:03:48 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses