Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2972: Cross Site Scripting in a466350665 Smart-SSO

0
Medium
VulnerabilityCVE-2026-2972cvecve-2026-2972
Published: Mon Feb 23 2026 (02/23/2026, 05:02:08 UTC)
Source: CVE Database V5
Vendor/Project: a466350665
Product: Smart-SSO

Description

A vulnerability was determined in a466350665 Smart-SSO up to 2.1.1. This affects the function Save of the file smart-sso-server/src/main/java/openjoe/smart/sso/server/controller/admin/UserController.java of the component Role Edit Page. Executing a manipulation can lead to cross site scripting. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 02/23/2026, 14:01:35 UTC

Technical Analysis

CVE-2026-2972 is a cross-site scripting vulnerability identified in the Smart-SSO product developed by a466350665, affecting versions 2.1.0 and 2.1.1. The flaw resides in the Save function of the Role Edit Page, implemented in the UserController.java file within the smart-sso-server component. Specifically, the vulnerability arises from insufficient input sanitization or output encoding when processing user-supplied data, allowing attackers to inject malicious scripts. The attack vector is remote, but exploitation requires the attacker to have high privileges (authenticated with elevated rights) and user interaction to trigger the malicious payload. The vulnerability does not impact confidentiality or availability directly but can compromise integrity by enabling script execution in the context of the victim's browser, potentially leading to session hijacking, credential theft, or unauthorized actions within the application. The CVSS 4.0 score is 4.8 (medium), reflecting the need for authentication and user interaction, with low complexity and no requirement for privileges beyond high-level access. The vendor was notified early but has not responded or issued patches, and no known exploits have been observed in the wild yet. Given the public disclosure, the risk of exploitation may increase over time.

Potential Impact

The primary impact of CVE-2026-2972 is the potential for attackers with high-level access to execute malicious scripts within the context of the Smart-SSO web application. This can lead to session hijacking, unauthorized actions performed on behalf of legitimate users, and potential compromise of user credentials or sensitive data accessible through the application interface. Although the vulnerability requires authenticated access and user interaction, it can undermine trust in the SSO system, which is critical for centralized authentication and access management. Organizations relying on Smart-SSO for identity and access control may face risks of privilege escalation or lateral movement if attackers leverage this XSS flaw to escalate their foothold. The absence of vendor response and patches increases exposure duration, potentially affecting organizations globally that have deployed affected versions. The impact is mainly on integrity and user trust rather than direct data breach or system availability.

Mitigation Recommendations

1. Immediately restrict access to the Role Edit Page and related administrative functions to trusted personnel only, minimizing exposure to potential attackers. 2. Implement strict input validation and output encoding on all user-supplied data in the Role Edit Page, especially in the Save function, to neutralize malicious scripts. 3. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the application context. 4. Monitor application logs for unusual activity or attempts to inject scripts, focusing on high-privilege user actions. 5. If possible, upgrade to a future patched version once the vendor releases it; meanwhile, consider applying custom patches or workarounds to sanitize inputs. 6. Educate administrators and users about the risk of XSS and the importance of cautious interaction with links or inputs in the SSO portal. 7. Use web application firewalls (WAFs) with rules targeting XSS patterns to provide an additional layer of defense. 8. Regularly review and audit the application's source code for similar vulnerabilities, especially in administrative modules.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-22T08:16:27.859Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699c5bedbe58cf853b920fc3

Added to database: 2/23/2026, 1:53:49 PM

Last enriched: 2/23/2026, 2:01:35 PM

Last updated: 2/24/2026, 4:13:35 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats