Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23858: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Dell Wyse Management Suite

0
Medium
VulnerabilityCVE-2026-23858cvecve-2026-23858cwe-79
Published: Tue Feb 24 2026 (02/24/2026, 19:31:31 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: Wyse Management Suite

Description

Dell Wyse Management Suite, versions prior to WMS 5.5, contain an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Script Injection.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 01:49:21 UTC

Technical Analysis

CVE-2026-23858 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting Dell Wyse Management Suite versions prior to 5.5. The flaw stems from improper neutralization of user-supplied input during the generation of web pages within the management suite's interface. An attacker with low privileges and remote access can exploit this vulnerability by injecting malicious scripts that execute in the context of the victim's browser when they interact with the affected web pages. The vulnerability requires user interaction, such as clicking a crafted link or visiting a malicious page, to trigger the script execution. The CVSS v3.1 base score is 5.4, reflecting medium severity, with attack vector being network-based, low attack complexity, requiring low privileges, and user interaction. The impact includes limited confidentiality and integrity loss, such as theft of session tokens, unauthorized actions within the management console, or manipulation of displayed data. Availability is not impacted. No public exploits or active exploitation have been reported to date. The vulnerability highlights the importance of proper input validation and output encoding in web applications, especially in critical management tools like Dell Wyse Management Suite, which is widely used for managing thin clients and endpoint devices in enterprise environments.

Potential Impact

The vulnerability could allow attackers to execute arbitrary scripts in the context of the management suite's web interface, potentially leading to session hijacking, unauthorized actions, or data disclosure within the management environment. This can undermine the confidentiality and integrity of management operations, possibly enabling further lateral movement or privilege escalation within the network. Organizations relying on Dell Wyse Management Suite for endpoint management may face risks of compromised administrative sessions or manipulation of device configurations. Although availability is not affected, the breach of trust and control over management consoles can have significant operational impacts. The medium severity rating reflects the balance between the limited privileges required and the potential for impactful data exposure or unauthorized control. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in targeted attacks against enterprises with large deployments of Dell Wyse products.

Mitigation Recommendations

1. Apply official patches or updates from Dell as soon as they become available for Wyse Management Suite version 5.5 or later. 2. Until patches are released, restrict network access to the management interface using firewalls, VPNs, or IP whitelisting to limit exposure to trusted users only. 3. Implement web application firewalls (WAFs) with rules to detect and block common XSS attack patterns targeting the management suite. 4. Enforce strict input validation and output encoding on all user-supplied data within the management console to prevent script injection. 5. Educate administrators and users to avoid clicking on suspicious links or interacting with untrusted content that could trigger XSS payloads. 6. Monitor logs and network traffic for anomalous activities indicative of exploitation attempts. 7. Consider deploying Content Security Policy (CSP) headers to reduce the impact of any injected scripts by restricting script sources. 8. Regularly review and audit user privileges to ensure minimal necessary access is granted, reducing the potential impact of compromised accounts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2026-01-16T18:05:07.319Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699e0f3bbe58cf853b2906c0

Added to database: 2/24/2026, 8:51:07 PM

Last enriched: 3/4/2026, 1:49:21 AM

Last updated: 4/10/2026, 6:33:38 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses