CVE-2026-28355: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in thinkst canarytokens
CVE-2026-28355 is a low-severity self Cross-Site Scripting (XSS) vulnerability in thinkst's Canarytokens product, specifically affecting versions prior to sha-7ff0e12. The vulnerability arises from improper input neutralization in the title field of the PWA Canarytoken, allowing JavaScript injection. This can lead to script execution when the token creator or a recipient of the installation link views the installation page. Although exploitation requires user interaction and does not disclose sensitive information like session data, an attacker could trick victims into executing malicious scripts. The issue has been patched in the latest Canarytokens. org version and self-hosted users are advised to update their Docker images accordingly. No known exploits are currently in the wild. Due to limited impact and exploitation complexity, the CVSS score is low (1. 3).
AI Analysis
Technical Summary
CVE-2026-28355 identifies a Cross-Site Scripting (XSS) vulnerability classified under CWE-79 in the thinkst Canarytokens product, specifically within the Progressive Web App (PWA) Canarytoken implementation. The vulnerability exists because the application fails to properly sanitize or neutralize JavaScript code inserted into the title field of a PWA Canarytoken. An attacker or even the token creator can embed malicious JavaScript in this field. When the installation page for the Canarytoken is accessed by the creator or a recipient of the installation link, the injected script executes in the context of the browser. This is a self-XSS scenario, meaning the attacker must convince the victim to open the crafted link. Importantly, the vulnerability does not allow exfiltration of sensitive information such as session tokens or credentials, limiting its impact. The flaw affects versions prior to commit sha-7ff0e12, and has been patched in the official Canarytokens.org service. Self-hosted deployments need to update their Docker images to the latest version to remediate the issue. The vulnerability does not require privileges or authentication to exploit but does require user interaction (clicking the link). No known active exploitation has been reported.
Potential Impact
The impact of CVE-2026-28355 is relatively low due to several mitigating factors. The vulnerability is a self-XSS, which inherently limits exploitation to scenarios where the victim is tricked into executing malicious scripts by clicking on a crafted link. There is no direct compromise of confidentiality, as no sensitive information such as session cookies or credentials is disclosed to the attacker. Integrity and availability impacts are minimal since the injected script runs only in the victim's browser context and does not affect server-side data or services. However, attackers could use this vulnerability for social engineering attacks, such as phishing or delivering malicious payloads within the browser session, potentially leading to further compromise if combined with other vulnerabilities or user actions. Organizations using Canarytokens for internal monitoring and deception should update promptly to avoid any risk of misuse or undermining trust in their detection mechanisms. Overall, the threat is low but should be addressed to maintain security hygiene.
Mitigation Recommendations
To mitigate CVE-2026-28355, organizations should immediately update their Canarytokens installations to the patched version at or beyond commit sha-7ff0e12. For users of the official Canarytokens.org service, no action is required as the patch is already applied. Self-hosted deployments must pull the latest Docker image to ensure the fix is incorporated. Additionally, administrators should review and sanitize any existing PWA Canarytokens with custom titles to remove potentially malicious scripts. Implementing Content Security Policy (CSP) headers on the installation pages can further reduce the risk of script execution by restricting allowable sources of executable scripts. Educating users about the risks of clicking untrusted links, especially those related to internal security tools, will also help reduce the likelihood of exploitation. Finally, monitoring logs for unusual access patterns to Canarytoken installation pages can help detect attempted exploitation attempts.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, Netherlands, India, Japan, South Korea
CVE-2026-28355: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in thinkst canarytokens
Description
CVE-2026-28355 is a low-severity self Cross-Site Scripting (XSS) vulnerability in thinkst's Canarytokens product, specifically affecting versions prior to sha-7ff0e12. The vulnerability arises from improper input neutralization in the title field of the PWA Canarytoken, allowing JavaScript injection. This can lead to script execution when the token creator or a recipient of the installation link views the installation page. Although exploitation requires user interaction and does not disclose sensitive information like session data, an attacker could trick victims into executing malicious scripts. The issue has been patched in the latest Canarytokens. org version and self-hosted users are advised to update their Docker images accordingly. No known exploits are currently in the wild. Due to limited impact and exploitation complexity, the CVSS score is low (1. 3).
AI-Powered Analysis
Technical Analysis
CVE-2026-28355 identifies a Cross-Site Scripting (XSS) vulnerability classified under CWE-79 in the thinkst Canarytokens product, specifically within the Progressive Web App (PWA) Canarytoken implementation. The vulnerability exists because the application fails to properly sanitize or neutralize JavaScript code inserted into the title field of a PWA Canarytoken. An attacker or even the token creator can embed malicious JavaScript in this field. When the installation page for the Canarytoken is accessed by the creator or a recipient of the installation link, the injected script executes in the context of the browser. This is a self-XSS scenario, meaning the attacker must convince the victim to open the crafted link. Importantly, the vulnerability does not allow exfiltration of sensitive information such as session tokens or credentials, limiting its impact. The flaw affects versions prior to commit sha-7ff0e12, and has been patched in the official Canarytokens.org service. Self-hosted deployments need to update their Docker images to the latest version to remediate the issue. The vulnerability does not require privileges or authentication to exploit but does require user interaction (clicking the link). No known active exploitation has been reported.
Potential Impact
The impact of CVE-2026-28355 is relatively low due to several mitigating factors. The vulnerability is a self-XSS, which inherently limits exploitation to scenarios where the victim is tricked into executing malicious scripts by clicking on a crafted link. There is no direct compromise of confidentiality, as no sensitive information such as session cookies or credentials is disclosed to the attacker. Integrity and availability impacts are minimal since the injected script runs only in the victim's browser context and does not affect server-side data or services. However, attackers could use this vulnerability for social engineering attacks, such as phishing or delivering malicious payloads within the browser session, potentially leading to further compromise if combined with other vulnerabilities or user actions. Organizations using Canarytokens for internal monitoring and deception should update promptly to avoid any risk of misuse or undermining trust in their detection mechanisms. Overall, the threat is low but should be addressed to maintain security hygiene.
Mitigation Recommendations
To mitigate CVE-2026-28355, organizations should immediately update their Canarytokens installations to the patched version at or beyond commit sha-7ff0e12. For users of the official Canarytokens.org service, no action is required as the patch is already applied. Self-hosted deployments must pull the latest Docker image to ensure the fix is incorporated. Additionally, administrators should review and sanitize any existing PWA Canarytokens with custom titles to remove potentially malicious scripts. Implementing Content Security Policy (CSP) headers on the installation pages can further reduce the risk of script execution by restricting allowable sources of executable scripts. Educating users about the risks of clicking untrusted links, especially those related to internal security tools, will also help reduce the likelihood of exploitation. Finally, monitoring logs for unusual access patterns to Canarytoken installation pages can help detect attempted exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-26T18:38:13.890Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a2087132ffcdb8a2724a77
Added to database: 2/27/2026, 9:11:13 PM
Last enriched: 2/27/2026, 9:27:20 PM
Last updated: 2/27/2026, 10:12:01 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28414: CWE-36: Absolute Path Traversal in gradio-app gradio
HighCVE-2026-27939: CWE-287: Improper Authentication in statamic cms
HighCVE-2026-28416: CWE-918: Server-Side Request Forgery (SSRF) in gradio-app gradio
HighCVE-2026-28415: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in gradio-app gradio
MediumCVE-2026-28411: CWE-288: Authentication Bypass Using an Alternate Path or Channel in LabRedesCefetRJ WeGIA
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.