CVE-2026-1721
CVE-2026-1721 is a reflected Cross-Site Scripting (XSS) vulnerability in the AI Playground's OAuth callback handler, where the error_description query parameter is unsafely embedded into an inline script tag. This flaw allows attackers to execute arbitrary JavaScript in the victim's session context by tricking users into clicking a crafted malicious link. Exploitation can lead to theft of user chat histories and unauthorized interaction with connected MCP servers on behalf of the victim. The vulnerability has a CVSS 4. 0 score of 6. 2 (medium severity), requiring no privileges but user interaction. Mitigation involves upgrading to agents@0. 3. 10 or ensuring proper escaping of user-controlled inputs in custom OAuth callback implementations. European organizations using the affected agents-sdk or AI Playground integrations should prioritize patching to prevent session compromise and data leakage.
AI Analysis
Technical Summary
CVE-2026-1721 is a reflected Cross-Site Scripting (XSS) vulnerability found in the OAuth callback handler of the AI Playground application, specifically in the file site/ai-playground/src/server.ts. The vulnerability arises because the error_description query parameter, which can be controlled by an attacker, is directly interpolated into an inline <script> tag without proper escaping or sanitization. This allows an attacker to inject arbitrary JavaScript code that executes in the context of the victim's browser session. The attack vector involves crafting a malicious URL containing a manipulated error_description parameter and convincing a victim to click it. Upon execution, the injected script can steal sensitive information such as the user's chat message history, which includes all large language model (LLM) interactions stored in the session. Additionally, the attacker can interact with any MCP servers connected to the victim's session, potentially performing unauthorized actions on behalf of the user. The vulnerability does not require any prior authentication or privileges but does require user interaction (clicking the malicious link). The CVSS 4.0 base score is 6.2, reflecting a medium severity level with network attack vector, low attack complexity, no privileges required, and user interaction needed. Mitigation has been addressed by Cloudflare in pull request https://github.com/cloudflare/agents/pull/841, and users of the agents-sdk are advised to upgrade to version 0.3.10. Developers implementing custom OAuth callback handlers should ensure that all user-controlled inputs are properly escaped before being interpolated into HTML or script contexts to prevent similar XSS issues.
Potential Impact
For European organizations, this vulnerability poses a significant risk to confidentiality and integrity of user data within applications leveraging the AI Playground or the affected agents-sdk versions. Attackers exploiting this flaw can hijack user sessions to exfiltrate sensitive chat histories, which may contain proprietary or confidential information, thereby breaching data privacy regulations such as GDPR. Furthermore, unauthorized access to connected MCP servers could lead to lateral movement within internal networks or manipulation of critical services, potentially disrupting business operations. The requirement for user interaction means phishing or social engineering campaigns could be used to deliver the malicious payload, increasing the risk to end users. Organizations in sectors with high reliance on AI-driven platforms or those integrating OAuth-based authentication workflows are particularly vulnerable. Failure to remediate could result in reputational damage, regulatory penalties, and operational disruptions.
Mitigation Recommendations
European organizations should immediately upgrade any deployments of the agents-sdk to version 0.3.10 or later to incorporate the official fix. For custom implementations using configureOAuthCallback or similar OAuth handlers, developers must audit their code to ensure all user-controlled inputs, especially query parameters like error_description, are properly escaped or sanitized before being embedded into HTML or JavaScript contexts. Employing security libraries or frameworks that automatically handle output encoding can reduce human error. Additionally, organizations should implement Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of potential XSS attacks. User awareness training to recognize phishing attempts that might deliver malicious links is also recommended. Regular security testing, including automated scanning and manual code reviews focused on injection vulnerabilities, should be integrated into the development lifecycle. Monitoring for unusual session activity or unauthorized MCP server interactions can help detect exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2026-1721
Description
CVE-2026-1721 is a reflected Cross-Site Scripting (XSS) vulnerability in the AI Playground's OAuth callback handler, where the error_description query parameter is unsafely embedded into an inline script tag. This flaw allows attackers to execute arbitrary JavaScript in the victim's session context by tricking users into clicking a crafted malicious link. Exploitation can lead to theft of user chat histories and unauthorized interaction with connected MCP servers on behalf of the victim. The vulnerability has a CVSS 4. 0 score of 6. 2 (medium severity), requiring no privileges but user interaction. Mitigation involves upgrading to agents@0. 3. 10 or ensuring proper escaping of user-controlled inputs in custom OAuth callback implementations. European organizations using the affected agents-sdk or AI Playground integrations should prioritize patching to prevent session compromise and data leakage.
AI-Powered Analysis
Technical Analysis
CVE-2026-1721 is a reflected Cross-Site Scripting (XSS) vulnerability found in the OAuth callback handler of the AI Playground application, specifically in the file site/ai-playground/src/server.ts. The vulnerability arises because the error_description query parameter, which can be controlled by an attacker, is directly interpolated into an inline <script> tag without proper escaping or sanitization. This allows an attacker to inject arbitrary JavaScript code that executes in the context of the victim's browser session. The attack vector involves crafting a malicious URL containing a manipulated error_description parameter and convincing a victim to click it. Upon execution, the injected script can steal sensitive information such as the user's chat message history, which includes all large language model (LLM) interactions stored in the session. Additionally, the attacker can interact with any MCP servers connected to the victim's session, potentially performing unauthorized actions on behalf of the user. The vulnerability does not require any prior authentication or privileges but does require user interaction (clicking the malicious link). The CVSS 4.0 base score is 6.2, reflecting a medium severity level with network attack vector, low attack complexity, no privileges required, and user interaction needed. Mitigation has been addressed by Cloudflare in pull request https://github.com/cloudflare/agents/pull/841, and users of the agents-sdk are advised to upgrade to version 0.3.10. Developers implementing custom OAuth callback handlers should ensure that all user-controlled inputs are properly escaped before being interpolated into HTML or script contexts to prevent similar XSS issues.
Potential Impact
For European organizations, this vulnerability poses a significant risk to confidentiality and integrity of user data within applications leveraging the AI Playground or the affected agents-sdk versions. Attackers exploiting this flaw can hijack user sessions to exfiltrate sensitive chat histories, which may contain proprietary or confidential information, thereby breaching data privacy regulations such as GDPR. Furthermore, unauthorized access to connected MCP servers could lead to lateral movement within internal networks or manipulation of critical services, potentially disrupting business operations. The requirement for user interaction means phishing or social engineering campaigns could be used to deliver the malicious payload, increasing the risk to end users. Organizations in sectors with high reliance on AI-driven platforms or those integrating OAuth-based authentication workflows are particularly vulnerable. Failure to remediate could result in reputational damage, regulatory penalties, and operational disruptions.
Mitigation Recommendations
European organizations should immediately upgrade any deployments of the agents-sdk to version 0.3.10 or later to incorporate the official fix. For custom implementations using configureOAuthCallback or similar OAuth handlers, developers must audit their code to ensure all user-controlled inputs, especially query parameters like error_description, are properly escaped or sanitized before being embedded into HTML or JavaScript contexts. Employing security libraries or frameworks that automatically handle output encoding can reduce human error. Additionally, organizations should implement Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of potential XSS attacks. User awareness training to recognize phishing attempts that might deliver malicious links is also recommended. Regular security testing, including automated scanning and manual code reviews focused on injection vulnerabilities, should be integrated into the development lifecycle. Monitoring for unusual session activity or unauthorized MCP server interactions can help detect exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- cloudflare
- Date Reserved
- 2026-01-30T20:12:22.668Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698e8a20c9e1ff5ad87f7e82
Added to database: 2/13/2026, 2:19:12 AM
Last enriched: 2/13/2026, 2:33:34 AM
Last updated: 2/13/2026, 3:38:08 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9293: CWE-295 Improper Certificate Validation in TP-Link Systems Inc. Tapo App
HighCVE-2025-9292: CWE-942 Permissive Cross-domain Security Policy with Untrusted Domains in TP-Link Systems Inc. Omada Cloud Controller
LowCVE-2024-21961: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in AMD AMD EPYC™ 7002 Series Processors
MediumCVE-2025-40905: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in DBOOK WWW::OAuth
HighCVE-2025-70092: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.