Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue

0
Medium
VulnerabilityCVE-2026-1695cvecve-2026-1695cwe-79
Published: Thu Feb 26 2026 (02/26/2026, 07:57:11 UTC)
Source: CVE Database V5
Vendor/Project: arcinfo
Product: PcVue

Description

CVE-2026-1695 is a medium severity cross-site scripting (XSS) vulnerability in arcinfo's PcVue versions 12. 0. 0 through 16. 3. 3, affecting the OAuth web services used by WebVue, WebScheduler, TouchVue, and SnapVue features. The flaw exists in the OAuth server's error page, which improperly neutralizes input during web page generation, allowing a remote attacker to craft malicious content that could be loaded by legitimate users upon failed authentication with an unknown client_id. Exploitation requires no privileges but does require user interaction, specifically the user encountering the error page. Although no known exploits are currently in the wild, successful exploitation could lead to session hijacking, phishing, or other client-side attacks. The vulnerability has a CVSS 4. 0 score of 5.

AI-Powered Analysis

AILast updated: 02/26/2026, 08:28:15 UTC

Technical Analysis

CVE-2026-1695 is an XSS vulnerability classified under CWE-79 that affects the OAuth web services component of arcinfo's PcVue software, specifically versions 12.0.0 through 16.3.3. The vulnerability resides in the error page generated by the OAuth server when user authentication fails due to an unknown client_id. The error page fails to properly sanitize or neutralize user-controllable input, allowing an attacker to inject malicious scripts that execute in the context of the victim's browser. This flaw impacts the WebVue, WebScheduler, TouchVue, and SnapVue features, which rely on OAuth for authentication. The attack vector is remote and does not require any authentication or privileges, but it does require the user to interact with the error page triggered by a failed OAuth authentication attempt. The CVSS 4.0 base score of 5.3 indicates a medium severity, with network attack vector, low attack complexity, no privileges required, but user interaction necessary. The vulnerability could be exploited to execute arbitrary JavaScript, potentially leading to session hijacking, credential theft, or redirection to malicious sites. No public exploits or patches are currently available, but the flaw is publicly disclosed and should be addressed promptly. The scope is limited to the OAuth error page, which reduces the overall impact but still poses a risk to users interacting with the affected PcVue services.

Potential Impact

The primary impact of CVE-2026-1695 is on the confidentiality and integrity of user sessions within PcVue's OAuth-enabled features. An attacker exploiting this XSS vulnerability can execute arbitrary scripts in the context of a legitimate user's browser, potentially stealing session tokens, redirecting users to phishing sites, or performing actions on behalf of the user. This could lead to unauthorized access to sensitive industrial control or monitoring data managed by PcVue, which is often used in critical infrastructure environments. While the availability impact is limited, the compromise of user credentials or session tokens can have cascading effects on operational security. Since the vulnerability affects multiple PcVue features widely used in industrial automation and building management, organizations worldwide relying on these systems could face targeted attacks. The lack of authentication requirements for exploitation increases the risk, although user interaction is necessary. The medium severity rating reflects a moderate but non-trivial risk, especially in environments where PcVue is integrated with critical operational technology (OT) systems.

Mitigation Recommendations

Organizations should monitor arcinfo's advisories for official patches addressing CVE-2026-1695 and apply them promptly once released. In the interim, administrators can mitigate risk by implementing strict Content Security Policies (CSP) to restrict the execution of unauthorized scripts on OAuth error pages. Input validation and output encoding should be reviewed and enhanced in custom deployments or integrations involving PcVue's OAuth services. Network-level protections such as Web Application Firewalls (WAFs) can be configured to detect and block typical XSS payloads targeting the OAuth error page. User education is also important to reduce the risk of social engineering attacks leveraging this vulnerability. Additionally, restricting access to PcVue's web interfaces to trusted networks and enforcing multi-factor authentication (MFA) can reduce the attack surface. Logging and monitoring for unusual OAuth authentication failures and suspicious requests to the error page can help detect exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
arcinfo
Date Reserved
2026-01-30T08:38:05.262Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a00034b7ef31ef0bd40695

Added to database: 2/26/2026, 8:11:32 AM

Last enriched: 2/26/2026, 8:28:15 AM

Last updated: 2/26/2026, 9:32:11 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats