CVE-2026-22257: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in salvo-rs salvo
Salvo is a Rust web backend framework. Prior to version 0.88.1, the function list_html generates a file view of a folder without sanitizing the files or folders names, this may potentially lead to XSS in cases where a website allow the access to public files using this feature and anyone can upload a file. This issue has been patched in version 0.88.1.
AI Analysis
Technical Summary
CVE-2026-22257 is a cross-site scripting (XSS) vulnerability identified in the Rust-based web backend framework salvo, specifically affecting versions prior to 0.88.1. The vulnerability stems from the list_html function, which generates an HTML view of a folder's contents but fails to sanitize file and folder names before rendering them. This improper neutralization of input (CWE-79) allows an attacker to inject malicious scripts into the generated HTML page. If a web application uses this feature to provide public access to files and allows users to upload files, an attacker can upload a file with a crafted name containing malicious JavaScript. When other users access the folder view, the malicious script executes in their browsers, potentially stealing session tokens, redirecting users, or performing other malicious actions. The CVSS v3.1 score of 8.8 reflects the vulnerability's high impact, with network attack vector, low attack complexity, no privileges required, but requiring user interaction. The scope is changed because the vulnerability affects the confidentiality, integrity, and availability of users interacting with the affected web application. Although no known exploits are currently reported in the wild, the vulnerability is critical for any public-facing salvo-based web services that allow file uploads. The issue was addressed in salvo version 0.88.1 by properly sanitizing file and folder names before HTML generation, preventing script injection.
Potential Impact
For European organizations, this vulnerability poses a significant risk to web applications built on the salvo framework that expose file directories to public users and allow file uploads. Successful exploitation can lead to theft of sensitive user data, session hijacking, and potential spread of malware through malicious scripts. This undermines user trust and can lead to regulatory non-compliance under GDPR due to data confidentiality breaches. The partial integrity loss and availability degradation can disrupt services and cause reputational damage. Organizations in sectors with high public interaction such as e-commerce, government portals, and cloud storage providers are particularly vulnerable. The ease of exploitation without authentication and the high CVSS score indicate a strong need for immediate remediation to prevent targeted attacks or opportunistic exploitation by attackers scanning for vulnerable salvo instances.
Mitigation Recommendations
European organizations should immediately upgrade all salvo framework instances to version 0.88.1 or later to apply the official patch that sanitizes file and folder names. Additionally, implement strict input validation and sanitization on all user-supplied data, especially file names and metadata. Restrict or disable public file uploads where possible, or enforce rigorous file type and content validation to prevent malicious payloads. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS by restricting script execution sources. Monitor web application logs for unusual file upload activity and anomalous requests targeting the list_html feature. Conduct regular security audits and penetration tests focusing on XSS vulnerabilities in web interfaces. Educate developers on secure coding practices related to output encoding and input sanitization in Rust web frameworks.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland
CVE-2026-22257: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in salvo-rs salvo
Description
Salvo is a Rust web backend framework. Prior to version 0.88.1, the function list_html generates a file view of a folder without sanitizing the files or folders names, this may potentially lead to XSS in cases where a website allow the access to public files using this feature and anyone can upload a file. This issue has been patched in version 0.88.1.
AI-Powered Analysis
Technical Analysis
CVE-2026-22257 is a cross-site scripting (XSS) vulnerability identified in the Rust-based web backend framework salvo, specifically affecting versions prior to 0.88.1. The vulnerability stems from the list_html function, which generates an HTML view of a folder's contents but fails to sanitize file and folder names before rendering them. This improper neutralization of input (CWE-79) allows an attacker to inject malicious scripts into the generated HTML page. If a web application uses this feature to provide public access to files and allows users to upload files, an attacker can upload a file with a crafted name containing malicious JavaScript. When other users access the folder view, the malicious script executes in their browsers, potentially stealing session tokens, redirecting users, or performing other malicious actions. The CVSS v3.1 score of 8.8 reflects the vulnerability's high impact, with network attack vector, low attack complexity, no privileges required, but requiring user interaction. The scope is changed because the vulnerability affects the confidentiality, integrity, and availability of users interacting with the affected web application. Although no known exploits are currently reported in the wild, the vulnerability is critical for any public-facing salvo-based web services that allow file uploads. The issue was addressed in salvo version 0.88.1 by properly sanitizing file and folder names before HTML generation, preventing script injection.
Potential Impact
For European organizations, this vulnerability poses a significant risk to web applications built on the salvo framework that expose file directories to public users and allow file uploads. Successful exploitation can lead to theft of sensitive user data, session hijacking, and potential spread of malware through malicious scripts. This undermines user trust and can lead to regulatory non-compliance under GDPR due to data confidentiality breaches. The partial integrity loss and availability degradation can disrupt services and cause reputational damage. Organizations in sectors with high public interaction such as e-commerce, government portals, and cloud storage providers are particularly vulnerable. The ease of exploitation without authentication and the high CVSS score indicate a strong need for immediate remediation to prevent targeted attacks or opportunistic exploitation by attackers scanning for vulnerable salvo instances.
Mitigation Recommendations
European organizations should immediately upgrade all salvo framework instances to version 0.88.1 or later to apply the official patch that sanitizes file and folder names. Additionally, implement strict input validation and sanitization on all user-supplied data, especially file names and metadata. Restrict or disable public file uploads where possible, or enforce rigorous file type and content validation to prevent malicious payloads. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS by restricting script execution sources. Monitor web application logs for unusual file upload activity and anomalous requests targeting the list_html feature. Conduct regular security audits and penetration tests focusing on XSS vulnerabilities in web interfaces. Educate developers on secure coding practices related to output encoding and input sanitization in Rust web frameworks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-07T05:19:12.922Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695ffd5601d35e5d0c85d73f
Added to database: 1/8/2026, 6:54:14 PM
Last enriched: 1/8/2026, 7:08:39 PM
Last updated: 1/9/2026, 2:33:05 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-47258: CWE-295 Improper Certificate Validation in 2N 2N Access Commander
HighCVE-2024-47256: CWE-321: Use of Hard-coded Cryptographic Key in 2N 2N Access Commander
MediumCVE-2024-47255: CWE-354 Improper Validation of Integrity Check Value in 2N 2N Access Commander
MediumCVE-2024-47254: CWE-807 Reliance on Untrusted Inputs in a Security Decision in 2N 2N Access Commander
MediumCVE-2024-47253: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in 2N 2N Access Commander
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.