CVE-2026-28355: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in thinkst canarytokens
Canarytokens help track activity and actions on a network. Versions prior to `sha-7ff0e12` have a Self Cross-Site Scripting vulnerability in the "PWA" Canarytoken, whereby the Canarytoken's creator can attack themselves or someone they share the link with. The creator of a PWA Canarytoken can insert Javascript into the title field of their PWA token. When the creator later browses the installation page for their own Canarytoken, the Javascript executes. This is a self-XSS. An attacker could create a Canarytoken with this self-XSS, and send the install link to a victim. When they click on it, the Javascript would execute. However, no sensitive information (ex. session information) will be disclosed to the malicious actor. This issue is now patched on Canarytokens.org. Users of self-hosted Canarytokens installations can update by pulling the latest Docker image, or any Docker image after sha-7ff0e12.
AI Analysis
Technical Summary
CVE-2026-28355 is a Cross-Site Scripting (XSS) vulnerability categorized under CWE-79 affecting thinkst's Canarytokens product, specifically the Progressive Web App (PWA) Canarytoken implementation. Versions prior to commit sha-7ff0e12 allow improper neutralization of input during web page generation, enabling JavaScript injection into the token's title field. This vulnerability manifests as a self-XSS, meaning the token creator can inadvertently execute malicious scripts on their own browser when viewing the installation page. Additionally, an attacker could craft a malicious PWA Canarytoken with embedded JavaScript and send the installation link to a victim, causing script execution upon clicking. However, the vulnerability does not expose sensitive information such as session tokens or credentials to the attacker, limiting its impact. The flaw arises from insufficient input sanitization or encoding of user-supplied data in the token title field before rendering in the web interface. The vulnerability requires no privileges or authentication but does require user interaction (clicking the link). The issue is patched in the official Canarytokens.org service and in self-hosted installations by updating to Docker images post sha-7ff0e12. No known exploits have been observed in the wild, and the CVSS 4.0 base score is 1.3, reflecting low severity due to limited impact and exploitation complexity.
Potential Impact
The impact of CVE-2026-28355 is limited due to its self-XSS nature and lack of sensitive data disclosure. Organizations using thinkst Canarytokens, especially self-hosted deployments, could face minor risks if attackers craft malicious PWA Canarytokens and trick users into clicking installation links. The vulnerability could lead to execution of arbitrary JavaScript in the context of the Canarytokens installation page, potentially enabling UI manipulation or phishing attempts within that page. However, since no session or authentication tokens are leaked, and the vulnerability requires user interaction, the risk of broader compromise or data exfiltration is minimal. The primary impact is on user trust and potential confusion or annoyance rather than critical security breaches. Nonetheless, attackers might leverage this vector in social engineering campaigns targeting security teams using Canarytokens. Organizations relying on Canarytokens for intrusion detection should patch promptly to maintain the integrity of their deception environment and avoid any risk of token misuse or user confusion.
Mitigation Recommendations
To mitigate CVE-2026-28355, organizations should immediately update their Canarytokens installations to the latest version, specifically pulling Docker images at or after commit sha-7ff0e12 where the vulnerability is patched. For users of the official Canarytokens.org service, no action is required as the patch is already applied. Additionally, administrators should educate users about the risks of clicking untrusted Canarytoken installation links, especially those received from unknown or suspicious sources. Implementing Content Security Policy (CSP) headers on the Canarytokens web interface can further reduce the risk of script injection exploitation. Regular code reviews and input validation enhancements should be enforced to prevent similar injection flaws. Monitoring logs for unusual Canarytoken installation link accesses or unexpected script execution behaviors can help detect attempted exploitation. Finally, security teams should maintain awareness of updates from thinkst and apply patches promptly to minimize exposure.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, Netherlands, France, India, Japan, South Korea
CVE-2026-28355: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in thinkst canarytokens
Description
Canarytokens help track activity and actions on a network. Versions prior to `sha-7ff0e12` have a Self Cross-Site Scripting vulnerability in the "PWA" Canarytoken, whereby the Canarytoken's creator can attack themselves or someone they share the link with. The creator of a PWA Canarytoken can insert Javascript into the title field of their PWA token. When the creator later browses the installation page for their own Canarytoken, the Javascript executes. This is a self-XSS. An attacker could create a Canarytoken with this self-XSS, and send the install link to a victim. When they click on it, the Javascript would execute. However, no sensitive information (ex. session information) will be disclosed to the malicious actor. This issue is now patched on Canarytokens.org. Users of self-hosted Canarytokens installations can update by pulling the latest Docker image, or any Docker image after sha-7ff0e12.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-28355 is a Cross-Site Scripting (XSS) vulnerability categorized under CWE-79 affecting thinkst's Canarytokens product, specifically the Progressive Web App (PWA) Canarytoken implementation. Versions prior to commit sha-7ff0e12 allow improper neutralization of input during web page generation, enabling JavaScript injection into the token's title field. This vulnerability manifests as a self-XSS, meaning the token creator can inadvertently execute malicious scripts on their own browser when viewing the installation page. Additionally, an attacker could craft a malicious PWA Canarytoken with embedded JavaScript and send the installation link to a victim, causing script execution upon clicking. However, the vulnerability does not expose sensitive information such as session tokens or credentials to the attacker, limiting its impact. The flaw arises from insufficient input sanitization or encoding of user-supplied data in the token title field before rendering in the web interface. The vulnerability requires no privileges or authentication but does require user interaction (clicking the link). The issue is patched in the official Canarytokens.org service and in self-hosted installations by updating to Docker images post sha-7ff0e12. No known exploits have been observed in the wild, and the CVSS 4.0 base score is 1.3, reflecting low severity due to limited impact and exploitation complexity.
Potential Impact
The impact of CVE-2026-28355 is limited due to its self-XSS nature and lack of sensitive data disclosure. Organizations using thinkst Canarytokens, especially self-hosted deployments, could face minor risks if attackers craft malicious PWA Canarytokens and trick users into clicking installation links. The vulnerability could lead to execution of arbitrary JavaScript in the context of the Canarytokens installation page, potentially enabling UI manipulation or phishing attempts within that page. However, since no session or authentication tokens are leaked, and the vulnerability requires user interaction, the risk of broader compromise or data exfiltration is minimal. The primary impact is on user trust and potential confusion or annoyance rather than critical security breaches. Nonetheless, attackers might leverage this vector in social engineering campaigns targeting security teams using Canarytokens. Organizations relying on Canarytokens for intrusion detection should patch promptly to maintain the integrity of their deception environment and avoid any risk of token misuse or user confusion.
Mitigation Recommendations
To mitigate CVE-2026-28355, organizations should immediately update their Canarytokens installations to the latest version, specifically pulling Docker images at or after commit sha-7ff0e12 where the vulnerability is patched. For users of the official Canarytokens.org service, no action is required as the patch is already applied. Additionally, administrators should educate users about the risks of clicking untrusted Canarytoken installation links, especially those received from unknown or suspicious sources. Implementing Content Security Policy (CSP) headers on the Canarytokens web interface can further reduce the risk of script injection exploitation. Regular code reviews and input validation enhancements should be enforced to prevent similar injection flaws. Monitoring logs for unusual Canarytoken installation link accesses or unexpected script execution behaviors can help detect attempted exploitation. Finally, security teams should maintain awareness of updates from thinkst and apply patches promptly to minimize exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-26T18:38:13.890Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a2087132ffcdb8a2724a77
Added to database: 2/27/2026, 9:11:13 PM
Last enriched: 3/7/2026, 9:12:31 PM
Last updated: 4/12/2026, 7:24:59 PM
Views: 103
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.