Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27148: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in storybookjs storybook

0
High
VulnerabilityCVE-2026-27148cvecve-2026-27148cwe-74cwe-79
Published: Wed Feb 25 2026 (02/25/2026, 21:46:48 UTC)
Source: CVE Database V5
Vendor/Project: storybookjs
Product: storybook

Description

Storybook is a frontend workshop for building user interface components and pages in isolation. Prior to versions 7.6.23, 8.6.17, 9.1.19, and 10.2.10, the WebSocket functionality in Storybook's dev server, used to create and update stories, is vulnerable to WebSocket hijacking. This vulnerability only affects the Storybook dev server; production builds are not impacted. Exploitation requires a developer to visit a malicious website while their local Storybook dev server is running. Because the WebSocket connection does not validate the origin of incoming connections, a malicious site can silently send WebSocket messages to the local instance without any further user interaction. If the Storybook dev server is intentionally exposed publicly (e.g. for design reviews or stakeholder demos) the risk is higher, as no malicious site visit is required. Any unauthenticated attacker can send WebSocket messages to it directly. The vulnerability affects the WebSocket message handlers for creating and saving stories. Both are vulnerable to injection via unsanitized input in the componentFilePath field, which can be exploited to achieve persistent XSS or Remote Code Execution (RCE). Versions 7.6.23, 8.6.17, 9.1.19, and 10.2.10 contain a fix for the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 09:59:06 UTC

Technical Analysis

CVE-2026-27148 is a critical vulnerability affecting the WebSocket implementation in the Storybook dev server, a popular frontend tool for isolated UI component development. The flaw arises from improper neutralization of special elements in output used by downstream components (CWE-74) and unsanitized input handling (CWE-79). Specifically, the WebSocket message handlers responsible for creating and saving stories do not validate or sanitize the componentFilePath field, allowing injection of malicious payloads. The WebSocket server also fails to validate the origin of incoming connections, enabling WebSocket hijacking. An attacker can exploit this by sending crafted WebSocket messages to the dev server, leading to persistent cross-site scripting or remote code execution. Exploitation requires either a developer visiting a malicious website while running the vulnerable local dev server or direct unauthenticated access if the dev server is publicly exposed (e.g., for demos or design reviews). The vulnerability affects Storybook versions prior to 7.6.23, 8.6.17, 9.1.19, and 10.2.10. Production builds are not affected, as the vulnerability is limited to the dev server environment. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, but user interaction needed unless the server is public, with high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. The fix involves validating WebSocket origins and sanitizing input fields to prevent injection attacks.

Potential Impact

This vulnerability poses a significant risk to organizations using Storybook for frontend development. If exploited, attackers can execute arbitrary code or inject persistent malicious scripts into the developer environment, potentially compromising developer machines and internal networks. The risk escalates if the dev server is exposed publicly, allowing remote unauthenticated attackers to exploit the flaw without user interaction. This can lead to theft of sensitive development data, insertion of backdoors or malware into UI components, and disruption of development workflows. While production environments are unaffected, the compromise of development environments can have downstream effects on software integrity and supply chain security. Organizations with remote or collaborative development setups that expose dev servers externally are particularly vulnerable. The vulnerability undermines trust in the development pipeline and can facilitate further attacks targeting the organization's infrastructure.

Mitigation Recommendations

1. Immediately upgrade Storybook to versions 7.6.23, 8.6.17, 9.1.19, or 10.2.10 or later where the vulnerability is patched. 2. Avoid exposing the Storybook dev server publicly; restrict access to trusted internal networks only. 3. Implement network-level controls such as firewalls or VPNs to limit WebSocket connections to authorized users. 4. Educate developers to avoid visiting untrusted or malicious websites while running the local Storybook dev server. 5. Monitor WebSocket traffic for anomalous messages or connections that could indicate exploitation attempts. 6. Consider running Storybook in isolated or containerized environments to limit potential impact. 7. Review and sanitize all inputs in custom Storybook addons or extensions to prevent injection risks. 8. Regularly audit development environments for signs of compromise or unusual activity related to WebSocket connections.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-18T00:18:53.961Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f7012b7ef31ef0b5b7bb1

Added to database: 2/25/2026, 9:56:34 PM

Last enriched: 3/5/2026, 9:59:06 AM

Last updated: 4/12/2026, 2:30:50 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses