Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-35466: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in CERT/CC cveClient/cveInterface.js

0
High
VulnerabilityCVE-2026-35466cvecve-2026-35466cwe-79
Published: Thu Apr 02 2026 (04/02/2026, 20:20:35 UTC)
Source: CVE Database V5
Vendor/Project: CERT/CC
Product: cveClient/cveInterface.js

Description

CVE-2026-35466 is a cross-site scripting (XSS) vulnerability found in the CERT/CC cveClient/cveInterface. js component. The vulnerability arises because the cveInterface. js script improperly neutralizes input during web page generation, specifically trusting HTML content received from CVE API services without adequate sanitization. This allows an attacker to inject malicious HTML or scripts that can be executed in the context of the user's browser. Although no known exploits are currently reported in the wild, the vulnerability could enable attackers to steal sensitive information, hijack user sessions, or perform other malicious actions. The vulnerability affects version 0 of the product and has no available patch at this time. Organizations using this component should prioritize input validation and output encoding to mitigate risk. Countries with significant use of CERT/CC tools and high reliance on vulnerability management platforms are most at risk. Given the ease of exploitation and potential impact on confidentiality and integrity, this vulnerability is assessed as high severity.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 23:24:06 UTC

Technical Analysis

CVE-2026-35466 is a security vulnerability classified under CWE-79, indicating improper neutralization of input during web page generation, commonly known as cross-site scripting (XSS). The affected component is cveClient/cveInterface.js, part of the CERT/CC suite, which interfaces with CVE API services to display vulnerability information. The root cause is that cveInterface.js trusts and directly injects HTML content received from CVE API services into the web page without proper sanitization or encoding. This flaw allows an attacker who can influence the input from CVE API services or intercept and modify responses to inject arbitrary HTML or JavaScript code. When a user loads the affected interface, the malicious code executes in their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability affects version 0 of the product, with no patches currently available. Although no active exploits have been reported, the vulnerability's nature makes it a significant risk, especially in environments where the CVE data source could be manipulated or where users access the interface in untrusted networks. The lack of a CVSS score requires an assessment based on impact and exploitability factors.

Potential Impact

The impact of CVE-2026-35466 can be substantial for organizations relying on the CERT/CC cveClient/cveInterface.js component for vulnerability management and CVE data visualization. Successful exploitation could lead to the execution of arbitrary scripts in users' browsers, enabling attackers to steal sensitive information such as authentication tokens, manipulate displayed data, or perform actions on behalf of the user. This compromises confidentiality and integrity of the affected systems and data. Additionally, it could undermine trust in vulnerability reporting tools, potentially delaying critical security responses. Organizations with large security teams or automated vulnerability tracking systems that integrate this component may face operational disruptions. The vulnerability could also be leveraged as a foothold for further attacks within internal networks if attackers gain access through phishing or social engineering. Although availability impact is limited, the overall risk to security posture and data privacy is high.

Mitigation Recommendations

To mitigate CVE-2026-35466, organizations should implement strict input validation and output encoding in the cveInterface.js component to ensure that any HTML or script content received from CVE API services is properly sanitized before rendering. Employing a robust Content Security Policy (CSP) can help restrict the execution of unauthorized scripts. Where possible, isolate the CVE data display interface from critical internal systems and restrict access to trusted users only. Monitor network traffic for anomalies that could indicate tampering with CVE API responses. Consider using server-side sanitization of data before it reaches the client interface. Until an official patch is released, avoid using version 0 of the affected product in production environments or replace it with alternative tools that properly handle untrusted input. Regularly update and audit third-party components for similar vulnerabilities. Educate users about the risks of XSS and encourage cautious interaction with vulnerability management interfaces.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
certcc
Date Reserved
2026-04-02T20:09:50.057Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cef472e6bfc5ba1d047ef1

Added to database: 4/2/2026, 10:57:54 PM

Last enriched: 4/2/2026, 11:24:06 PM

Last updated: 4/3/2026, 2:07:23 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses