Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32721: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in openwrt luci

0
High
VulnerabilityCVE-2026-32721cvecve-2026-32721cwe-79
Published: Thu Mar 19 2026 (03/19/2026, 22:46:43 UTC)
Source: CVE Database V5
Vendor/Project: openwrt
Product: luci

Description

LuCI is the OpenWrt Configuration Interface. Versions prior to both 24.10.5 and 25.12.0, contain a stored XSS vulnerability in the wireless scan modal, where SSID values from scan results are rendered as raw HTML without any sanitization. The wireless.js file in the luci-mod-network package passes SSIDs via a template literal to dom.append(), which processes them through innerHTML, allowing an attacker to craft a malicious SSID containing arbitrary HTML/JavaScript. Exploitation requires the user to actively open the wireless scan modal (e.g., to connect to a Wi-Fi access point or survey nearby channels), and only affects OpenWrt versions newer than 23.05/22.03 up to the patched releases (24.10.6 and 25.12.1). The issue has been fixed in version LuCI 26.072.65753~068150b.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 18:55:40 UTC

Technical Analysis

CVE-2026-32721 is a stored cross-site scripting (XSS) vulnerability identified in the LuCI configuration interface of OpenWrt, specifically affecting versions prior to 26.072.65753~068150b. The vulnerability arises from improper neutralization of input during web page generation (CWE-79). Within the wireless scan modal, SSID values obtained from Wi-Fi scan results are directly injected into the DOM using innerHTML via a template literal in the wireless.js file of the luci-mod-network package. Because these SSIDs are not sanitized, an attacker can craft a malicious SSID containing arbitrary HTML or JavaScript code. When a user opens the wireless scan modal to view or connect to Wi-Fi networks, the malicious payload executes in the context of the LuCI web interface. This can lead to theft of sensitive information, session hijacking, or further compromise of the device. Exploitation requires local network proximity to broadcast the malicious SSID and user interaction to open the scan modal. The vulnerability affects OpenWrt versions newer than 23.05/22.03 up to but not including 26.072.65753~068150b, with the fix implemented in that version. The CVSS v3.1 score is 8.6 (High), reflecting local attack vector, low complexity, no privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild as of the publication date.

Potential Impact

The vulnerability enables an attacker to execute arbitrary JavaScript in the context of the LuCI web interface, potentially leading to full compromise of the device's management interface. This could allow attackers to steal administrative credentials, manipulate router configurations, install persistent backdoors, or disrupt network availability. Since OpenWrt is widely used in embedded devices and routers, exploitation could affect home users, enterprises, and service providers relying on these devices for network management. The requirement for user interaction (opening the wireless scan modal) and local network proximity limits remote exploitation but does not eliminate risk in environments where attackers can broadcast malicious SSIDs, such as public Wi-Fi hotspots or compromised internal networks. The scope includes all affected OpenWrt devices running vulnerable LuCI versions, which may be significant given OpenWrt's popularity in various regions. The high CVSS score indicates a serious threat to confidentiality, integrity, and availability.

Mitigation Recommendations

Administrators should immediately upgrade affected OpenWrt devices to LuCI version 26.072.65753~068150b or later, where the vulnerability is patched. If upgrading is not immediately possible, network administrators should restrict access to the LuCI interface to trusted networks only and disable wireless scanning features that trigger the vulnerable code path. Implement network segmentation to isolate management interfaces from untrusted wireless networks. Users should be educated to avoid opening the wireless scan modal in untrusted environments. Additionally, monitoring for unusual SSIDs and logging access to the LuCI interface can help detect potential exploitation attempts. Applying Content Security Policy (CSP) headers on the LuCI interface could provide an additional layer of defense against XSS exploitation. Vendors and integrators should review their firmware builds to ensure the patched LuCI version is included in future releases.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T15:02:00.625Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bc8223e32a4fbe5f062179

Added to database: 3/19/2026, 11:09:23 PM

Last enriched: 3/27/2026, 6:55:40 PM

Last updated: 5/2/2026, 10:48:15 PM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses