Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26357: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Dell Unisphere for PowerMax 9.2.4.18

0
Medium
VulnerabilityCVE-2026-26357cvecve-2026-26357cwe-79
Published: Tue Feb 17 2026 (02/17/2026, 19:41:10 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: Unisphere for PowerMax 9.2.4.18

Description

Dell Unisphere for PowerMax, version(s) 9.2.4.x, contain(s) an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user's web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 20:36:42 UTC

Technical Analysis

CVE-2026-26357 identifies a cross-site scripting (XSS) vulnerability in Dell Unisphere for PowerMax version 9.2.4.18, a web-based management interface for Dell's PowerMax storage arrays. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. An attacker with low privileges and remote access can craft malicious input that is not properly sanitized by the application, causing the injection of executable HTML or JavaScript code into the web interface. When a legitimate user accesses the affected page, the malicious script executes within their browser context, potentially allowing the attacker to steal session tokens, disclose sensitive information, or perform client-side request forgery (CSRF) attacks. The vulnerability requires user interaction (e.g., the victim must visit a malicious link or page) and does not affect system availability directly. The CVSS v3.1 score of 5.4 reflects a medium severity, considering the attack vector is network-based, the attack complexity is low, privileges required are low, but user interaction is necessary and the impact on confidentiality and integrity is limited to partial. No public exploits or patches are currently available, but the vulnerability is publicly disclosed and should be addressed promptly.

Potential Impact

The exploitation of this XSS vulnerability could lead to unauthorized disclosure of sensitive information such as session cookies or administrative tokens, enabling attackers to impersonate legitimate users. This may result in unauthorized access to the management interface of critical storage infrastructure, potentially leading to further compromise or data leakage. Client-side request forgery could allow attackers to perform actions on behalf of the victim user within the context of the web application, potentially escalating the attack. Although availability is not directly impacted, the compromise of confidentiality and integrity in a storage management system can have severe downstream effects on data security and operational trust. Organizations relying on Dell PowerMax for enterprise storage management, especially those in sectors like finance, healthcare, and government, could face significant risks if this vulnerability is exploited. The medium severity rating indicates a moderate but actionable threat that requires timely mitigation to prevent exploitation.

Mitigation Recommendations

Organizations should implement the following specific mitigations: 1) Monitor Dell's official security advisories for patches or updates addressing CVE-2026-26357 and apply them immediately upon release. 2) Restrict remote access to the Unisphere management interface using network segmentation, VPNs, or IP whitelisting to limit exposure to trusted users only. 3) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns indicative of XSS attacks targeting the Unisphere interface. 4) Educate users and administrators to avoid clicking on untrusted links or opening suspicious emails that could trigger the XSS payload. 5) Enable and enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of session hijacking. 6) Conduct regular security assessments and penetration testing focused on the management interface to identify and remediate similar input validation issues. 7) Implement Content Security Policy (CSP) headers on the web application to restrict the execution of unauthorized scripts. These measures collectively reduce the attack surface and limit the potential impact of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2026-02-13T18:05:27.825Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699575bb80d747be205376a5

Added to database: 2/18/2026, 8:18:03 AM

Last enriched: 3/6/2026, 8:36:42 PM

Last updated: 4/7/2026, 2:20:48 AM

Views: 97

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses