Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28280: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jmpsec osctrl

0
Medium
VulnerabilityCVE-2026-28280cvecve-2026-28280cwe-79
Published: Thu Feb 26 2026 (02/26/2026, 23:00:58 UTC)
Source: CVE Database V5
Vendor/Project: jmpsec
Product: osctrl

Description

osctrl is an osquery management solution. Prior to version 0.5.0, a stored cross-site scripting (XSS) vulnerability exists in the `osctrl-admin` on-demand query list. A user with query-level permissions can inject arbitrary JavaScript via the query parameter when running an on-demand query. The payload is stored and executes in the browser of any user (including administrators) who visits the query list page. This can be chained with CSRF token extraction to escalate privileges and take actions as the logged in user. An attacker with query-level permissions (the lowest privilege tier) can execute arbitrary JavaScript in the browsers of all users who view the query list. Depending on their level of access, it can lead to full platform compromise if an administrator executes the payload. The issue is fixed in osctrl `v0.5.0`. As a workaround, restrict query-level permissions to trusted users, monitor query list for suspicious payloads, and/or review osctrl user accounts for unauthorized administrators.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 21:28:49 UTC

Technical Analysis

The vulnerability identified as CVE-2026-28280 affects jmpsec's osctrl, an osquery management platform, in versions prior to 0.5.0. It is a stored cross-site scripting (XSS) flaw categorized under CWE-79, caused by improper neutralization of input during web page generation. Specifically, users with query-level permissions can inject arbitrary JavaScript code via the query parameter when running on-demand queries. This malicious payload is stored persistently and executes in the browsers of any users who access the on-demand query list page, including administrators. Because the script runs in the context of the victim's browser session, it can steal sensitive information such as CSRF tokens. Attackers can leverage this to escalate privileges beyond their initial query-level access, potentially taking full control of the osctrl platform. The vulnerability requires the attacker to have at least query-level permissions, which is the lowest privilege tier, and user interaction in the form of viewing the infected query list page. The vulnerability does not affect availability but impacts confidentiality and integrity significantly. The vendor fixed this issue in version 0.5.0. No known exploits are reported in the wild as of the publication date. Workarounds include restricting query-level permissions to trusted users, monitoring query lists for suspicious payloads, and auditing user accounts for unauthorized administrators.

Potential Impact

This vulnerability poses a significant risk to organizations using osctrl versions prior to 0.5.0. Since query-level permissions are the lowest privilege tier, an attacker with minimal access can execute arbitrary JavaScript in the browsers of all users who view the query list, including administrators. This can lead to theft of authentication tokens, session hijacking, and privilege escalation, potentially resulting in full platform compromise. The impact extends to confidentiality and integrity of the platform and its managed endpoints. Organizations relying on osctrl for osquery management could face unauthorized data access, manipulation of queries, and disruption of endpoint monitoring and management workflows. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially in environments with multiple users having query-level access. The vulnerability could be exploited internally or by compromised accounts, making insider threats or credential theft scenarios particularly dangerous.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade osctrl to version 0.5.0 or later, where the issue is fixed. Until an upgrade is possible, restrict query-level permissions strictly to trusted users only, minimizing the attack surface. Implement monitoring and alerting on the on-demand query list for suspicious or unexpected JavaScript payloads. Conduct regular audits of user accounts to detect unauthorized administrators or users with query-level permissions. Employ Content Security Policy (CSP) headers to limit the execution of inline scripts and reduce the impact of XSS attacks. Educate users, especially administrators, to be cautious when interacting with query lists and to report unusual behavior. Additionally, consider isolating the osctrl management interface within a secure network segment to limit exposure. Finally, review and harden session management and CSRF protections to reduce the risk of token theft and privilege escalation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-26T01:52:58.734Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0d31032ffcdb8a2667e04

Added to database: 2/26/2026, 11:11:12 PM

Last enriched: 3/6/2026, 9:28:49 PM

Last updated: 4/11/2026, 5:51:42 PM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses