Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33331: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in middleapi orpc

0
High
VulnerabilityCVE-2026-33331cvecve-2026-33331cwe-79
Published: Tue Mar 24 2026 (03/24/2026, 19:18:00 UTC)
Source: CVE Database V5
Vendor/Project: middleapi
Product: orpc

Description

CVE-2026-33331 is a high-severity stored cross-site scripting (XSS) vulnerability affecting versions of the middleapi orpc tool prior to 1. 13. 9. The vulnerability arises from improper neutralization of input during the generation of OpenAPI documentation, allowing attackers who can control fields in the OpenAPI specification (e. g. , info. description) to inject malicious JavaScript. When a user views the generated API documentation, this script executes, potentially compromising confidentiality by stealing sensitive data. Exploitation requires no authentication but does require user interaction to view the malicious documentation. The vulnerability has been patched in version 1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 20:23:13 UTC

Technical Analysis

CVE-2026-33331 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, found in the middleapi orpc tool, which facilitates building end-to-end type-safe APIs compliant with OpenAPI standards. The vulnerability exists in versions prior to 1.13.9 within the OpenAPI documentation generation component. Specifically, if an attacker can manipulate any field in the OpenAPI specification—such as the info.description field—they can inject payloads that break out of the JSON context used in the documentation rendering. This leads to arbitrary JavaScript execution when a user accesses the generated API documentation page. The vulnerability does not require authentication but does require the victim to view the compromised documentation, making it a stored XSS vector. The impact primarily affects confidentiality by enabling theft of session tokens, credentials, or other sensitive data accessible in the browser context. Integrity impact is low as the attack does not alter backend data, and availability is unaffected. The vulnerability has been addressed in version 1.13.9 by properly sanitizing and encoding user-controlled inputs before embedding them in the documentation. No known exploits are currently observed in the wild, but the high CVSS score of 8.2 reflects the ease of exploitation and potential impact. Organizations using orpc should prioritize upgrading and auditing their OpenAPI specifications to prevent injection of malicious content.

Potential Impact

The primary impact of this vulnerability is on the confidentiality of users interacting with the API documentation generated by orpc. Attackers can execute arbitrary JavaScript in the context of the documentation page, potentially stealing authentication tokens, cookies, or other sensitive information accessible via the browser. This can lead to account compromise or unauthorized access to internal systems if the documentation is accessed by privileged users. The integrity of backend systems is minimally affected since the attack vector is client-side script execution without direct backend modification. Availability is not impacted. However, the scope of affected systems includes any organization using orpc versions prior to 1.13.9 to generate OpenAPI documentation, especially those exposing documentation to external or untrusted users. The vulnerability could be leveraged in targeted attacks against developers, API consumers, or internal teams relying on orpc-generated documentation, potentially facilitating further attacks within the organization’s infrastructure.

Mitigation Recommendations

1. Upgrade all instances of middleapi orpc to version 1.13.9 or later, where the vulnerability has been patched. 2. Implement strict validation and sanitization of all fields in the OpenAPI specification, especially those that can be user-controlled or externally sourced, to prevent injection of malicious scripts. 3. Restrict access to API documentation to trusted users only, using authentication and authorization controls, to reduce exposure to potential attackers. 4. Employ Content Security Policy (CSP) headers on the documentation hosting environment to limit the execution of unauthorized scripts. 5. Regularly audit and review OpenAPI specifications for suspicious or unexpected content before publishing documentation. 6. Educate developers and API consumers about the risks of XSS in API documentation and encourage safe browsing practices. 7. Monitor logs and user reports for signs of suspicious activity related to API documentation access. 8. Consider isolating API documentation in sandboxed environments or separate domains to limit the impact of any potential XSS exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T22:15:11.811Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2ea08f4197a8e3b6b6429

Added to database: 3/24/2026, 7:46:16 PM

Last enriched: 3/31/2026, 8:23:13 PM

Last updated: 5/7/2026, 6:08:41 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses