Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28355: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in thinkst canarytokens

0
Low
VulnerabilityCVE-2026-28355cvecve-2026-28355cwe-79
Published: Fri Feb 27 2026 (02/27/2026, 21:04:13 UTC)
Source: CVE Database V5
Vendor/Project: thinkst
Product: canarytokens

Description

CVE-2026-28355 is a low-severity self Cross-Site Scripting (XSS) vulnerability in thinkst's Canarytokens product, specifically affecting versions prior to sha-7ff0e12. The vulnerability arises from improper input neutralization in the title field of the PWA Canarytoken, allowing JavaScript injection. This can lead to script execution when the token creator or a recipient of the installation link views the installation page. Although exploitation requires user interaction and does not disclose sensitive information like session data, an attacker could trick victims into executing malicious scripts. The issue has been patched in the latest Canarytokens. org version and self-hosted users are advised to update their Docker images accordingly. No known exploits are currently in the wild. Due to limited impact and exploitation complexity, the CVSS score is low (1. 3).

AI-Powered Analysis

AILast updated: 02/27/2026, 21:27:20 UTC

Technical Analysis

CVE-2026-28355 identifies a Cross-Site Scripting (XSS) vulnerability classified under CWE-79 in the thinkst Canarytokens product, specifically within the Progressive Web App (PWA) Canarytoken implementation. The vulnerability exists because the application fails to properly sanitize or neutralize JavaScript code inserted into the title field of a PWA Canarytoken. An attacker or even the token creator can embed malicious JavaScript in this field. When the installation page for the Canarytoken is accessed by the creator or a recipient of the installation link, the injected script executes in the context of the browser. This is a self-XSS scenario, meaning the attacker must convince the victim to open the crafted link. Importantly, the vulnerability does not allow exfiltration of sensitive information such as session tokens or credentials, limiting its impact. The flaw affects versions prior to commit sha-7ff0e12, and has been patched in the official Canarytokens.org service. Self-hosted deployments need to update their Docker images to the latest version to remediate the issue. The vulnerability does not require privileges or authentication to exploit but does require user interaction (clicking the link). No known active exploitation has been reported.

Potential Impact

The impact of CVE-2026-28355 is relatively low due to several mitigating factors. The vulnerability is a self-XSS, which inherently limits exploitation to scenarios where the victim is tricked into executing malicious scripts by clicking on a crafted link. There is no direct compromise of confidentiality, as no sensitive information such as session cookies or credentials is disclosed to the attacker. Integrity and availability impacts are minimal since the injected script runs only in the victim's browser context and does not affect server-side data or services. However, attackers could use this vulnerability for social engineering attacks, such as phishing or delivering malicious payloads within the browser session, potentially leading to further compromise if combined with other vulnerabilities or user actions. Organizations using Canarytokens for internal monitoring and deception should update promptly to avoid any risk of misuse or undermining trust in their detection mechanisms. Overall, the threat is low but should be addressed to maintain security hygiene.

Mitigation Recommendations

To mitigate CVE-2026-28355, organizations should immediately update their Canarytokens installations to the patched version at or beyond commit sha-7ff0e12. For users of the official Canarytokens.org service, no action is required as the patch is already applied. Self-hosted deployments must pull the latest Docker image to ensure the fix is incorporated. Additionally, administrators should review and sanitize any existing PWA Canarytokens with custom titles to remove potentially malicious scripts. Implementing Content Security Policy (CSP) headers on the installation pages can further reduce the risk of script execution by restricting allowable sources of executable scripts. Educating users about the risks of clicking untrusted links, especially those related to internal security tools, will also help reduce the likelihood of exploitation. Finally, monitoring logs for unusual access patterns to Canarytoken installation pages can help detect attempted exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-26T18:38:13.890Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a2087132ffcdb8a2724a77

Added to database: 2/27/2026, 9:11:13 PM

Last enriched: 2/27/2026, 9:27:20 PM

Last updated: 2/27/2026, 10:12:01 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses