Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26862: n/a

0
High
VulnerabilityCVE-2026-26862cvecve-2026-26862
Published: Fri Feb 27 2026 (02/27/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CleverTap Web SDK version 1.15.2 and earlier is vulnerable to DOM-based Cross-Site Scripting (XSS) via window.postMessage in the Visual Builder module. The origin validation in src/modules/visualBuilder/pageBuilder.js (lines 56-60) uses the includes() method to verify the originUrl contains "dashboard.clevertap.com", which can be bypassed by an attacker using a crafted subdomain

AI-Powered Analysis

AILast updated: 02/27/2026, 18:27:37 UTC

Technical Analysis

CVE-2026-26862 is a DOM-based Cross-Site Scripting (XSS) vulnerability found in the CleverTap Web SDK version 1.15.2 and earlier, specifically within the Visual Builder module. The vulnerability stems from improper origin validation in the source file src/modules/visualBuilder/pageBuilder.js, where the origin URL is checked using the JavaScript includes() method to verify that it contains the string "dashboard.clevertap.com". This approach is insecure because an attacker can craft a malicious subdomain, such as "dashboard.clevertap.com.evil.com", which passes the includes() check but is not a legitimate origin. This bypass allows the attacker to inject and execute arbitrary JavaScript code within the victim's browser context. The attack vector leverages window.postMessage, a browser API used for cross-origin communication, which is mishandled due to the flawed origin validation. Since this is a DOM-based XSS, the malicious script executes on the client side without server-side input validation failures. The vulnerability does not require authentication or user interaction, increasing its risk profile. While no known exploits have been reported in the wild, the vulnerability is publicly disclosed and should be addressed promptly. The lack of a CVSS score necessitates an assessment based on the impact on confidentiality, integrity, and availability, ease of exploitation, and scope of affected systems. CleverTap is widely used for user engagement and analytics in web applications, making this vulnerability relevant to many organizations globally.

Potential Impact

The exploitation of this DOM-based XSS vulnerability can lead to the execution of arbitrary JavaScript in the context of affected web applications, potentially compromising user data confidentiality and integrity. Attackers could steal session tokens, manipulate the DOM to perform phishing attacks, or execute malicious actions on behalf of users. This can result in unauthorized access to sensitive information, user impersonation, and erosion of user trust. Since CleverTap is integrated into many web applications for analytics and user engagement, a successful attack could impact a broad user base. The vulnerability does not directly affect availability but can indirectly cause service disruptions through malicious payloads. Organizations using the vulnerable SDK may face reputational damage, regulatory penalties, and financial losses if exploited. The ease of exploitation without authentication or user interaction increases the likelihood of attacks, especially in environments where the SDK is exposed to untrusted origins.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade to a patched version of the CleverTap Web SDK once available. In the absence of an official patch, developers should implement stricter origin validation by replacing the insecure includes() method with exact origin matching or using robust URL parsing techniques to verify the origin against a whitelist of allowed domains. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Additionally, sanitize and validate all data received via window.postMessage to ensure it conforms to expected formats and origins. Conduct thorough security testing of the Visual Builder module and related components to detect similar flaws. Monitor application logs and user reports for signs of exploitation attempts. Educate development teams about secure coding practices related to cross-origin communication and DOM-based XSS prevention.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-02-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a1de4132ffcdb8a26144cc

Added to database: 2/27/2026, 6:11:13 PM

Last enriched: 2/27/2026, 6:27:37 PM

Last updated: 2/27/2026, 9:18:11 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses