Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22720: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in VMware VMware Aria Operations

0
High
VulnerabilityCVE-2026-22720cvecve-2026-22720cwe-79
Published: Wed Feb 25 2026 (02/25/2026, 19:33:14 UTC)
Source: CVE Database V5
Vendor/Project: VMware
Product: VMware Aria Operations

Description

VMware Aria Operations contains a stored cross-site scripting vulnerability. A malicious actor with privileges to create custom benchmarks may be able to inject script to perform administrative actions in VMware Aria Operations.  To remediate CVE-2026-22720, apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' of  VMSA-2026-0001 https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947https:// .

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 11:33:46 UTC

Technical Analysis

CVE-2026-22720 is a high-severity stored cross-site scripting (XSS) vulnerability identified in VMware Aria Operations version 8.18.0. The vulnerability stems from improper neutralization of input during web page generation (CWE-79), allowing malicious actors with privileges to create custom benchmarks to inject arbitrary JavaScript code into the application. This injected script executes in the context of the victim’s browser, enabling the attacker to perform unauthorized administrative actions such as modifying configurations, accessing sensitive data, or escalating privileges within VMware Aria Operations. The attack requires the attacker to have authenticated access with specific privileges and for the victim to interact with the malicious content, typically by viewing the crafted benchmark or report. The vulnerability impacts confidentiality, integrity, and availability, as it can lead to full system compromise. VMware has addressed this vulnerability in patches referenced in VMSA-2026-0001, and organizations are urged to apply these updates promptly. Although no active exploitation has been reported, the ease of exploitation combined with the high privileges required and the critical nature of VMware Aria Operations in enterprise environments make this a significant threat. The CVSS v3.1 base score is 8.0, reflecting network attack vector, low attack complexity, required privileges, user interaction, and high impact on confidentiality, integrity, and availability.

Potential Impact

The impact of CVE-2026-22720 on organizations worldwide is substantial due to the critical role VMware Aria Operations plays in monitoring and managing IT infrastructure. Successful exploitation can lead to unauthorized administrative control, allowing attackers to manipulate system configurations, access sensitive operational data, and disrupt monitoring capabilities. This can result in data breaches, operational downtime, and loss of trust in IT management systems. Enterprises relying on VMware Aria Operations for performance and capacity management may face significant operational risks, including undetected malicious activities and compromised system integrity. The requirement for authenticated access limits the attack surface but does not eliminate risk, especially in environments with multiple administrators or users with benchmark creation privileges. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future attacks. Organizations failing to patch may become targets for attackers seeking to leverage this vulnerability for lateral movement or persistence within critical infrastructure.

Mitigation Recommendations

To mitigate CVE-2026-22720, organizations should immediately apply the security patches provided by VMware as detailed in the VMSA-2026-0001 advisory. Beyond patching, organizations should review and restrict privileges related to creating custom benchmarks, ensuring only trusted administrators have such capabilities. Implement strict input validation and output encoding in any custom extensions or integrations with VMware Aria Operations to reduce XSS risks. Monitor logs for unusual administrative activities or unexpected benchmark creations. Employ web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting VMware Aria Operations interfaces. Conduct regular security training for administrators to recognize phishing or social engineering attempts that could lead to credential compromise. Finally, maintain a robust incident response plan to quickly address any suspected exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
vmware
Date Reserved
2026-01-09T06:54:36.841Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b0db7ef31ef0b54d932

Added to database: 2/25/2026, 9:35:09 PM

Last enriched: 3/5/2026, 11:33:46 AM

Last updated: 4/11/2026, 6:01:35 PM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses