CVE-2026-27210: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mpetroff pannellum
CVE-2026-27210 is a medium severity cross-site scripting (XSS) vulnerability in the Pannellum panorama viewer versions 2. 5. 0 through 2. 5. 6. It arises from improper neutralization of input in the hot spot attributes configuration, allowing injection of HTML event handler attributes. An attacker can exploit this by hosting a malicious JSON config file that triggers JavaScript execution when a user visits a standalone viewer URL, without any additional interaction. This can lead to arbitrary script execution, page content manipulation, and potential phishing or session hijacking if cookies are shared. The vulnerability is fixed in version 2. 5.
AI Analysis
Technical Summary
CVE-2026-27210 is a cross-site scripting vulnerability classified under CWE-79 affecting Pannellum, an open-source web panorama viewer. The flaw exists in versions 2.5.0 through 2.5.6, where the hot spot attributes configuration property allows any attribute to be set, including HTML event handler attributes such as onclick or onmouseover. This improper input neutralization enables an attacker to craft malicious JSON configuration files that embed executable JavaScript code. When a user accesses a standalone Pannellum viewer URL referencing such a malicious config file, the embedded scripts execute automatically without requiring further user interaction. This can result in arbitrary JavaScript execution within the context of the hosting website, enabling attackers to manipulate page content, perform phishing attacks by spoofing the site, or steal sensitive information like cookies or session tokens. The vulnerability bypasses the escapeHTML protections because it targets attribute injection rather than inner HTML content. The issue was resolved in version 2.5.7 by restricting attribute injection. As a workaround, setting a Content-Security-Policy header with script-src-attr 'none' can block inline event handlers, mitigating the risk. Additionally, it is recommended not to host pannellum.htm on domains that share cookies with user authentication to reduce the impact of potential XSS attacks. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network exploitability without privileges or user interaction, but with limited scope and impact. No known exploits have been reported in the wild as of the publication date.
Potential Impact
The vulnerability allows remote attackers to execute arbitrary JavaScript code in the context of affected websites using vulnerable Pannellum versions. This can lead to significant security impacts including theft of sensitive user data such as cookies or session tokens, enabling account hijacking or unauthorized access. Attackers can also manipulate the displayed content to conduct phishing attacks or spread malware. Since the exploit requires only visiting a maliciously crafted URL, it can be triggered without user interaction, increasing the risk of widespread exploitation. Organizations hosting Pannellum standalone viewers or using untrusted JSON config files are at risk. If the vulnerable viewer is hosted on domains sharing authentication cookies, the impact escalates to potential full account compromise. However, the vulnerability does not affect the core application logic or server-side components, limiting the scope to client-side attacks. The absence of known exploits in the wild reduces immediate risk but does not preclude future attacks. Overall, the impact is medium but can be severe in environments with sensitive user sessions or inadequate content security policies.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade Pannellum to version 2.5.7 or later, where the issue is fixed by restricting attribute injection. If immediate upgrade is not feasible, implement a strict Content-Security-Policy header with the directive script-src-attr 'none' to block execution of inline event handlers embedded via attributes. Avoid hosting pannellum.htm on domains that share cookies with user authentication to prevent session theft via XSS. Validate and sanitize all JSON configuration files from untrusted sources before use, ensuring they do not contain malicious attributes. Employ subresource integrity (SRI) and serve the viewer over HTTPS to prevent tampering. Monitor web server logs for suspicious requests referencing unusual JSON config files. Educate developers and administrators about the risks of attribute injection and the importance of CSP enforcement. Regularly audit web applications for similar XSS vectors in third-party components. These targeted steps go beyond generic advice by focusing on configuration, hosting practices, and CSP tuning specific to this vulnerability.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Australia, Canada, Netherlands, Sweden
CVE-2026-27210: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mpetroff pannellum
Description
CVE-2026-27210 is a medium severity cross-site scripting (XSS) vulnerability in the Pannellum panorama viewer versions 2. 5. 0 through 2. 5. 6. It arises from improper neutralization of input in the hot spot attributes configuration, allowing injection of HTML event handler attributes. An attacker can exploit this by hosting a malicious JSON config file that triggers JavaScript execution when a user visits a standalone viewer URL, without any additional interaction. This can lead to arbitrary script execution, page content manipulation, and potential phishing or session hijacking if cookies are shared. The vulnerability is fixed in version 2. 5.
AI-Powered Analysis
Technical Analysis
CVE-2026-27210 is a cross-site scripting vulnerability classified under CWE-79 affecting Pannellum, an open-source web panorama viewer. The flaw exists in versions 2.5.0 through 2.5.6, where the hot spot attributes configuration property allows any attribute to be set, including HTML event handler attributes such as onclick or onmouseover. This improper input neutralization enables an attacker to craft malicious JSON configuration files that embed executable JavaScript code. When a user accesses a standalone Pannellum viewer URL referencing such a malicious config file, the embedded scripts execute automatically without requiring further user interaction. This can result in arbitrary JavaScript execution within the context of the hosting website, enabling attackers to manipulate page content, perform phishing attacks by spoofing the site, or steal sensitive information like cookies or session tokens. The vulnerability bypasses the escapeHTML protections because it targets attribute injection rather than inner HTML content. The issue was resolved in version 2.5.7 by restricting attribute injection. As a workaround, setting a Content-Security-Policy header with script-src-attr 'none' can block inline event handlers, mitigating the risk. Additionally, it is recommended not to host pannellum.htm on domains that share cookies with user authentication to reduce the impact of potential XSS attacks. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network exploitability without privileges or user interaction, but with limited scope and impact. No known exploits have been reported in the wild as of the publication date.
Potential Impact
The vulnerability allows remote attackers to execute arbitrary JavaScript code in the context of affected websites using vulnerable Pannellum versions. This can lead to significant security impacts including theft of sensitive user data such as cookies or session tokens, enabling account hijacking or unauthorized access. Attackers can also manipulate the displayed content to conduct phishing attacks or spread malware. Since the exploit requires only visiting a maliciously crafted URL, it can be triggered without user interaction, increasing the risk of widespread exploitation. Organizations hosting Pannellum standalone viewers or using untrusted JSON config files are at risk. If the vulnerable viewer is hosted on domains sharing authentication cookies, the impact escalates to potential full account compromise. However, the vulnerability does not affect the core application logic or server-side components, limiting the scope to client-side attacks. The absence of known exploits in the wild reduces immediate risk but does not preclude future attacks. Overall, the impact is medium but can be severe in environments with sensitive user sessions or inadequate content security policies.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade Pannellum to version 2.5.7 or later, where the issue is fixed by restricting attribute injection. If immediate upgrade is not feasible, implement a strict Content-Security-Policy header with the directive script-src-attr 'none' to block execution of inline event handlers embedded via attributes. Avoid hosting pannellum.htm on domains that share cookies with user authentication to prevent session theft via XSS. Validate and sanitize all JSON configuration files from untrusted sources before use, ensuring they do not contain malicious attributes. Employ subresource integrity (SRI) and serve the viewer over HTTPS to prevent tampering. Monitor web server logs for suspicious requests referencing unusual JSON config files. Educate developers and administrators about the risks of attribute injection and the importance of CSP enforcement. Regularly audit web applications for similar XSS vectors in third-party components. These targeted steps go beyond generic advice by focusing on configuration, hosting practices, and CSP tuning specific to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-18T19:47:02.156Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699946e0be58cf853b4e0107
Added to database: 2/21/2026, 5:47:12 AM
Last enriched: 2/21/2026, 6:01:35 AM
Last updated: 2/21/2026, 7:23:58 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27458: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Kovah LinkAce
HighCVE-2026-27452: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in JonathanWilbur asn1-ts
CriticalCVE-2026-27206: CWE-502: Deserialization of Untrusted Data in zumba json-serializer
HighCVE-2026-27471: CWE-862: Missing Authorization in frappe erpnext
CriticalCVE-2026-2863: Path Traversal in feng_ha_ha ssm-erp
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.