Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28355: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in thinkst canarytokens

0
Low
VulnerabilityCVE-2026-28355cvecve-2026-28355cwe-79
Published: Fri Feb 27 2026 (02/27/2026, 21:04:13 UTC)
Source: CVE Database V5
Vendor/Project: thinkst
Product: canarytokens

Description

Canarytokens help track activity and actions on a network. Versions prior to `sha-7ff0e12` have a Self Cross-Site Scripting vulnerability in the "PWA" Canarytoken, whereby the Canarytoken's creator can attack themselves or someone they share the link with. The creator of a PWA Canarytoken can insert Javascript into the title field of their PWA token. When the creator later browses the installation page for their own Canarytoken, the Javascript executes. This is a self-XSS. An attacker could create a Canarytoken with this self-XSS, and send the install link to a victim. When they click on it, the Javascript would execute. However, no sensitive information (ex. session information) will be disclosed to the malicious actor. This issue is now patched on Canarytokens.org. Users of self-hosted Canarytokens installations can update by pulling the latest Docker image, or any Docker image after sha-7ff0e12.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/07/2026, 21:12:31 UTC

Technical Analysis

CVE-2026-28355 is a Cross-Site Scripting (XSS) vulnerability categorized under CWE-79 affecting thinkst's Canarytokens product, specifically the Progressive Web App (PWA) Canarytoken implementation. Versions prior to commit sha-7ff0e12 allow improper neutralization of input during web page generation, enabling JavaScript injection into the token's title field. This vulnerability manifests as a self-XSS, meaning the token creator can inadvertently execute malicious scripts on their own browser when viewing the installation page. Additionally, an attacker could craft a malicious PWA Canarytoken with embedded JavaScript and send the installation link to a victim, causing script execution upon clicking. However, the vulnerability does not expose sensitive information such as session tokens or credentials to the attacker, limiting its impact. The flaw arises from insufficient input sanitization or encoding of user-supplied data in the token title field before rendering in the web interface. The vulnerability requires no privileges or authentication but does require user interaction (clicking the link). The issue is patched in the official Canarytokens.org service and in self-hosted installations by updating to Docker images post sha-7ff0e12. No known exploits have been observed in the wild, and the CVSS 4.0 base score is 1.3, reflecting low severity due to limited impact and exploitation complexity.

Potential Impact

The impact of CVE-2026-28355 is limited due to its self-XSS nature and lack of sensitive data disclosure. Organizations using thinkst Canarytokens, especially self-hosted deployments, could face minor risks if attackers craft malicious PWA Canarytokens and trick users into clicking installation links. The vulnerability could lead to execution of arbitrary JavaScript in the context of the Canarytokens installation page, potentially enabling UI manipulation or phishing attempts within that page. However, since no session or authentication tokens are leaked, and the vulnerability requires user interaction, the risk of broader compromise or data exfiltration is minimal. The primary impact is on user trust and potential confusion or annoyance rather than critical security breaches. Nonetheless, attackers might leverage this vector in social engineering campaigns targeting security teams using Canarytokens. Organizations relying on Canarytokens for intrusion detection should patch promptly to maintain the integrity of their deception environment and avoid any risk of token misuse or user confusion.

Mitigation Recommendations

To mitigate CVE-2026-28355, organizations should immediately update their Canarytokens installations to the latest version, specifically pulling Docker images at or after commit sha-7ff0e12 where the vulnerability is patched. For users of the official Canarytokens.org service, no action is required as the patch is already applied. Additionally, administrators should educate users about the risks of clicking untrusted Canarytoken installation links, especially those received from unknown or suspicious sources. Implementing Content Security Policy (CSP) headers on the Canarytokens web interface can further reduce the risk of script injection exploitation. Regular code reviews and input validation enhancements should be enforced to prevent similar injection flaws. Monitoring logs for unusual Canarytoken installation link accesses or unexpected script execution behaviors can help detect attempted exploitation. Finally, security teams should maintain awareness of updates from thinkst and apply patches promptly to minimize exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-26T18:38:13.890Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a2087132ffcdb8a2724a77

Added to database: 2/27/2026, 9:11:13 PM

Last enriched: 3/7/2026, 9:12:31 PM

Last updated: 4/12/2026, 7:24:59 PM

Views: 103

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses