CVE-2026-28280: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jmpsec osctrl
osctrl is an osquery management solution. Prior to version 0.5.0, a stored cross-site scripting (XSS) vulnerability exists in the `osctrl-admin` on-demand query list. A user with query-level permissions can inject arbitrary JavaScript via the query parameter when running an on-demand query. The payload is stored and executes in the browser of any user (including administrators) who visits the query list page. This can be chained with CSRF token extraction to escalate privileges and take actions as the logged in user. An attacker with query-level permissions (the lowest privilege tier) can execute arbitrary JavaScript in the browsers of all users who view the query list. Depending on their level of access, it can lead to full platform compromise if an administrator executes the payload. The issue is fixed in osctrl `v0.5.0`. As a workaround, restrict query-level permissions to trusted users, monitor query list for suspicious payloads, and/or review osctrl user accounts for unauthorized administrators.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-28280 affects jmpsec's osctrl, an osquery management platform, in versions prior to 0.5.0. It is a stored cross-site scripting (XSS) flaw categorized under CWE-79, caused by improper neutralization of input during web page generation. Specifically, users with query-level permissions can inject arbitrary JavaScript code via the query parameter when running on-demand queries. This malicious payload is stored persistently and executes in the browsers of any users who access the on-demand query list page, including administrators. Because the script runs in the context of the victim's browser session, it can steal sensitive information such as CSRF tokens. Attackers can leverage this to escalate privileges beyond their initial query-level access, potentially taking full control of the osctrl platform. The vulnerability requires the attacker to have at least query-level permissions, which is the lowest privilege tier, and user interaction in the form of viewing the infected query list page. The vulnerability does not affect availability but impacts confidentiality and integrity significantly. The vendor fixed this issue in version 0.5.0. No known exploits are reported in the wild as of the publication date. Workarounds include restricting query-level permissions to trusted users, monitoring query lists for suspicious payloads, and auditing user accounts for unauthorized administrators.
Potential Impact
This vulnerability poses a significant risk to organizations using osctrl versions prior to 0.5.0. Since query-level permissions are the lowest privilege tier, an attacker with minimal access can execute arbitrary JavaScript in the browsers of all users who view the query list, including administrators. This can lead to theft of authentication tokens, session hijacking, and privilege escalation, potentially resulting in full platform compromise. The impact extends to confidentiality and integrity of the platform and its managed endpoints. Organizations relying on osctrl for osquery management could face unauthorized data access, manipulation of queries, and disruption of endpoint monitoring and management workflows. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially in environments with multiple users having query-level access. The vulnerability could be exploited internally or by compromised accounts, making insider threats or credential theft scenarios particularly dangerous.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade osctrl to version 0.5.0 or later, where the issue is fixed. Until an upgrade is possible, restrict query-level permissions strictly to trusted users only, minimizing the attack surface. Implement monitoring and alerting on the on-demand query list for suspicious or unexpected JavaScript payloads. Conduct regular audits of user accounts to detect unauthorized administrators or users with query-level permissions. Employ Content Security Policy (CSP) headers to limit the execution of inline scripts and reduce the impact of XSS attacks. Educate users, especially administrators, to be cautious when interacting with query lists and to report unusual behavior. Additionally, consider isolating the osctrl management interface within a secure network segment to limit exposure. Finally, review and harden session management and CSRF protections to reduce the risk of token theft and privilege escalation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, India
CVE-2026-28280: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jmpsec osctrl
Description
osctrl is an osquery management solution. Prior to version 0.5.0, a stored cross-site scripting (XSS) vulnerability exists in the `osctrl-admin` on-demand query list. A user with query-level permissions can inject arbitrary JavaScript via the query parameter when running an on-demand query. The payload is stored and executes in the browser of any user (including administrators) who visits the query list page. This can be chained with CSRF token extraction to escalate privileges and take actions as the logged in user. An attacker with query-level permissions (the lowest privilege tier) can execute arbitrary JavaScript in the browsers of all users who view the query list. Depending on their level of access, it can lead to full platform compromise if an administrator executes the payload. The issue is fixed in osctrl `v0.5.0`. As a workaround, restrict query-level permissions to trusted users, monitor query list for suspicious payloads, and/or review osctrl user accounts for unauthorized administrators.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-28280 affects jmpsec's osctrl, an osquery management platform, in versions prior to 0.5.0. It is a stored cross-site scripting (XSS) flaw categorized under CWE-79, caused by improper neutralization of input during web page generation. Specifically, users with query-level permissions can inject arbitrary JavaScript code via the query parameter when running on-demand queries. This malicious payload is stored persistently and executes in the browsers of any users who access the on-demand query list page, including administrators. Because the script runs in the context of the victim's browser session, it can steal sensitive information such as CSRF tokens. Attackers can leverage this to escalate privileges beyond their initial query-level access, potentially taking full control of the osctrl platform. The vulnerability requires the attacker to have at least query-level permissions, which is the lowest privilege tier, and user interaction in the form of viewing the infected query list page. The vulnerability does not affect availability but impacts confidentiality and integrity significantly. The vendor fixed this issue in version 0.5.0. No known exploits are reported in the wild as of the publication date. Workarounds include restricting query-level permissions to trusted users, monitoring query lists for suspicious payloads, and auditing user accounts for unauthorized administrators.
Potential Impact
This vulnerability poses a significant risk to organizations using osctrl versions prior to 0.5.0. Since query-level permissions are the lowest privilege tier, an attacker with minimal access can execute arbitrary JavaScript in the browsers of all users who view the query list, including administrators. This can lead to theft of authentication tokens, session hijacking, and privilege escalation, potentially resulting in full platform compromise. The impact extends to confidentiality and integrity of the platform and its managed endpoints. Organizations relying on osctrl for osquery management could face unauthorized data access, manipulation of queries, and disruption of endpoint monitoring and management workflows. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially in environments with multiple users having query-level access. The vulnerability could be exploited internally or by compromised accounts, making insider threats or credential theft scenarios particularly dangerous.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade osctrl to version 0.5.0 or later, where the issue is fixed. Until an upgrade is possible, restrict query-level permissions strictly to trusted users only, minimizing the attack surface. Implement monitoring and alerting on the on-demand query list for suspicious or unexpected JavaScript payloads. Conduct regular audits of user accounts to detect unauthorized administrators or users with query-level permissions. Employ Content Security Policy (CSP) headers to limit the execution of inline scripts and reduce the impact of XSS attacks. Educate users, especially administrators, to be cautious when interacting with query lists and to report unusual behavior. Additionally, consider isolating the osctrl management interface within a secure network segment to limit exposure. Finally, review and harden session management and CSRF protections to reduce the risk of token theft and privilege escalation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-26T01:52:58.734Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0d31032ffcdb8a2667e04
Added to database: 2/26/2026, 11:11:12 PM
Last enriched: 3/6/2026, 9:28:49 PM
Last updated: 4/11/2026, 5:51:42 PM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.