Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28272: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kiteworks security-advisories

0
High
VulnerabilityCVE-2026-28272cvecve-2026-28272cwe-79
Published: Fri Feb 27 2026 (02/27/2026, 20:22:59 UTC)
Source: CVE Database V5
Vendor/Project: kiteworks
Product: security-advisories

Description

CVE-2026-28272 is a high-severity stored cross-site scripting (XSS) vulnerability affecting Kiteworks Email Protection Gateway versions prior to 9. 2. 0. Authenticated administrators can inject malicious scripts via a configuration interface, which then execute when other users interact with the affected UI. The vulnerability requires administrator privileges and user interaction to trigger, but can lead to full confidentiality and integrity compromise within the affected system. Kiteworks patched this issue in version 9. 2. 0. No known exploits are currently in the wild. Organizations using vulnerable versions should upgrade promptly to mitigate risk.

AI-Powered Analysis

AILast updated: 02/27/2026, 20:55:26 UTC

Technical Analysis

CVE-2026-28272 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 affecting the Kiteworks Email Protection Gateway prior to version 9.2.0. The vulnerability arises from improper neutralization of input during web page generation in the administrative configuration interface. Specifically, authenticated administrators can inject malicious JavaScript code into configuration fields that are stored and later rendered in the user interface without proper sanitization or encoding. When other users interact with the affected UI components, the malicious script executes in their browsers within the security context of the Kiteworks application. This can lead to session hijacking, credential theft, unauthorized actions, or further exploitation within the private data network. The vulnerability has a CVSS 3.1 base score of 8.1, reflecting its high impact on confidentiality and integrity, with network attack vector, low attack complexity, and requiring high privileges and user interaction. The scope is changed (S:C) indicating that the vulnerability affects resources beyond the initially vulnerable component. Kiteworks addressed this issue in version 9.2.0 by implementing proper input validation and output encoding to neutralize malicious scripts. No public exploits have been reported to date, but the vulnerability poses a significant risk due to the sensitive nature of the platform and the administrative access required to exploit it.

Potential Impact

The impact of CVE-2026-28272 is significant for organizations using Kiteworks Email Protection Gateway versions prior to 9.2.0. Successful exploitation allows an authenticated administrator to inject malicious scripts that execute in other users' browsers, potentially leading to session hijacking, theft of sensitive data, unauthorized configuration changes, or lateral movement within the private data network. Given Kiteworks' role in secure data exchange and email protection, compromise could expose confidential communications and sensitive organizational data. The requirement for administrator privileges limits the attack surface but insider threats or compromised admin accounts increase risk. The vulnerability affects confidentiality and integrity severely, though availability impact is minimal. Organizations relying on Kiteworks for secure data handling could face regulatory compliance issues, reputational damage, and operational disruptions if exploited.

Mitigation Recommendations

To mitigate CVE-2026-28272, organizations should immediately upgrade Kiteworks Email Protection Gateway to version 9.2.0 or later, where the vulnerability is patched. Additionally, restrict administrative access strictly using the principle of least privilege and enforce strong authentication mechanisms such as multi-factor authentication (MFA) for all admin accounts to reduce the risk of credential compromise. Conduct regular audits of administrator activities and configuration changes to detect suspicious behavior. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting script execution sources. Educate administrators on secure input handling and the risks of injecting untrusted content. Finally, monitor logs and network traffic for unusual activity that could indicate exploitation attempts. Avoid using vulnerable versions in production environments until patched.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-26T01:52:58.733Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a2016632ffcdb8a26f324a

Added to database: 2/27/2026, 8:41:10 PM

Last enriched: 2/27/2026, 8:55:26 PM

Last updated: 2/27/2026, 9:58:23 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses