Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27210: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mpetroff pannellum

0
Medium
VulnerabilityCVE-2026-27210cvecve-2026-27210cwe-79
Published: Sat Feb 21 2026 (02/21/2026, 05:24:16 UTC)
Source: CVE Database V5
Vendor/Project: mpetroff
Product: pannellum

Description

CVE-2026-27210 is a medium severity cross-site scripting (XSS) vulnerability in the Pannellum panorama viewer versions 2. 5. 0 through 2. 5. 6. It arises from improper neutralization of input in the hot spot attributes configuration, allowing injection of HTML event handler attributes. An attacker can exploit this by hosting a malicious JSON config file that triggers JavaScript execution when a user visits a standalone viewer URL, without any additional interaction. This can lead to arbitrary script execution, page content manipulation, and potential phishing or session hijacking if cookies are shared. The vulnerability is fixed in version 2. 5.

AI-Powered Analysis

AILast updated: 02/21/2026, 06:01:35 UTC

Technical Analysis

CVE-2026-27210 is a cross-site scripting vulnerability classified under CWE-79 affecting Pannellum, an open-source web panorama viewer. The flaw exists in versions 2.5.0 through 2.5.6, where the hot spot attributes configuration property allows any attribute to be set, including HTML event handler attributes such as onclick or onmouseover. This improper input neutralization enables an attacker to craft malicious JSON configuration files that embed executable JavaScript code. When a user accesses a standalone Pannellum viewer URL referencing such a malicious config file, the embedded scripts execute automatically without requiring further user interaction. This can result in arbitrary JavaScript execution within the context of the hosting website, enabling attackers to manipulate page content, perform phishing attacks by spoofing the site, or steal sensitive information like cookies or session tokens. The vulnerability bypasses the escapeHTML protections because it targets attribute injection rather than inner HTML content. The issue was resolved in version 2.5.7 by restricting attribute injection. As a workaround, setting a Content-Security-Policy header with script-src-attr 'none' can block inline event handlers, mitigating the risk. Additionally, it is recommended not to host pannellum.htm on domains that share cookies with user authentication to reduce the impact of potential XSS attacks. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network exploitability without privileges or user interaction, but with limited scope and impact. No known exploits have been reported in the wild as of the publication date.

Potential Impact

The vulnerability allows remote attackers to execute arbitrary JavaScript code in the context of affected websites using vulnerable Pannellum versions. This can lead to significant security impacts including theft of sensitive user data such as cookies or session tokens, enabling account hijacking or unauthorized access. Attackers can also manipulate the displayed content to conduct phishing attacks or spread malware. Since the exploit requires only visiting a maliciously crafted URL, it can be triggered without user interaction, increasing the risk of widespread exploitation. Organizations hosting Pannellum standalone viewers or using untrusted JSON config files are at risk. If the vulnerable viewer is hosted on domains sharing authentication cookies, the impact escalates to potential full account compromise. However, the vulnerability does not affect the core application logic or server-side components, limiting the scope to client-side attacks. The absence of known exploits in the wild reduces immediate risk but does not preclude future attacks. Overall, the impact is medium but can be severe in environments with sensitive user sessions or inadequate content security policies.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade Pannellum to version 2.5.7 or later, where the issue is fixed by restricting attribute injection. If immediate upgrade is not feasible, implement a strict Content-Security-Policy header with the directive script-src-attr 'none' to block execution of inline event handlers embedded via attributes. Avoid hosting pannellum.htm on domains that share cookies with user authentication to prevent session theft via XSS. Validate and sanitize all JSON configuration files from untrusted sources before use, ensuring they do not contain malicious attributes. Employ subresource integrity (SRI) and serve the viewer over HTTPS to prevent tampering. Monitor web server logs for suspicious requests referencing unusual JSON config files. Educate developers and administrators about the risks of attribute injection and the importance of CSP enforcement. Regularly audit web applications for similar XSS vectors in third-party components. These targeted steps go beyond generic advice by focusing on configuration, hosting practices, and CSP tuning specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-18T19:47:02.156Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699946e0be58cf853b4e0107

Added to database: 2/21/2026, 5:47:12 AM

Last enriched: 2/21/2026, 6:01:35 AM

Last updated: 2/21/2026, 7:23:58 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats