Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1769: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Xerox CentreWare

0
Medium
VulnerabilityCVE-2026-1769cvecve-2026-1769cwe-79
Published: Fri Feb 06 2026 (02/06/2026, 17:19:45 UTC)
Source: CVE Database V5
Vendor/Project: Xerox
Product: CentreWare

Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Xerox CentreWare on Windows allows Stored XSS.This issue affects CentreWare: through 7.0.6.  Consider upgrading Xerox® CentreWare Web® to v7.2.2.25 via the software available on Xerox.com

AI-Powered Analysis

AILast updated: 02/06/2026, 17:59:36 UTC

Technical Analysis

CVE-2026-1769 identifies a Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79 in Xerox CentreWare Web running on Windows platforms, affecting versions through 7.0.6. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows malicious scripts to be stored and later executed in the browsers of authenticated users accessing the CentreWare interface. This type of XSS can enable attackers to steal session cookies, perform actions on behalf of users, or exfiltrate sensitive information, thereby compromising confidentiality. The CVSS v3.1 score is 5.3 (medium), reflecting that exploitation requires local access (AV:L), high attack complexity (AC:H), no privileges (PR:N), and user interaction (UI:R). The scope remains unchanged (S:U), with high confidentiality impact (C:H), low integrity impact (I:L), and no availability impact (A:N). Xerox recommends upgrading to version 7.2.2.25 to remediate the issue. No public exploits are known, but the vulnerability poses a risk in environments where CentreWare is used for document management and printer fleet administration, especially in enterprise settings where sensitive documents are handled. The vulnerability highlights the importance of input validation and output encoding in web application security to prevent script injection attacks.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information managed through Xerox CentreWare, including document metadata and user credentials. Attackers exploiting this flaw could hijack user sessions or manipulate the CentreWare interface, potentially disrupting document workflows or gaining footholds for further network intrusion. The confidentiality impact is significant due to the potential exposure of sensitive corporate data. Organizations in sectors such as government, finance, healthcare, and legal services, which rely heavily on secure document management, face elevated risks. Additionally, the requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate insider threat risks or attacks via social engineering. The absence of known exploits reduces immediate risk but does not preclude targeted attacks, especially in high-value environments. Failure to patch could result in compliance issues with European data protection regulations such as GDPR if data breaches occur.

Mitigation Recommendations

European organizations should immediately inventory their Xerox CentreWare deployments to identify affected versions up to 7.0.6. The primary mitigation is to upgrade CentreWare Web to version 7.2.2.25 or later, as provided by Xerox. Until upgrades are applied, organizations should restrict access to the CentreWare web interface to trusted users and networks, employing network segmentation and strict access controls. Implement web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting CentreWare. Conduct user awareness training to reduce the risk of social engineering attacks that could facilitate exploitation. Regularly monitor CentreWare logs for suspicious activity indicative of attempted XSS exploitation. Additionally, apply Content Security Policy (CSP) headers where possible to limit script execution contexts. Finally, integrate CentreWare vulnerability status into the organization's patch management and vulnerability assessment programs to ensure timely remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Xerox
Date Reserved
2026-02-02T15:52:12.797Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698628a5f9fa50a62f2311af

Added to database: 2/6/2026, 5:45:09 PM

Last enriched: 2/6/2026, 5:59:36 PM

Last updated: 2/6/2026, 7:18:38 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats