Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-43644: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in stefanprodan podinfo

0
Medium
VulnerabilityCVE-2026-43644cvecve-2026-43644
Published: Thu May 14 2026 (05/14/2026, 12:37:40 UTC)
Source: CVE Database V5
Vendor/Project: stefanprodan
Product: podinfo

Description

podinfo through 6.11.2 contains a reflected cross-site scripting vulnerability in the /echo and /api/echo endpoints where the echoHandler writes request body content directly to the response without setting explicit Content-Type or X-Content-Type-Options headers. Attackers can craft cross-origin HTML pages with auto-submitting forms containing script payloads in the request body, which are served as text/html due to Go's content type detection, allowing the reflected script to execute in the podinfo origin context when victims visit the attacker's page.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/14/2026, 13:22:13 UTC

Technical Analysis

CVE-2026-43644 is a reflected cross-site scripting vulnerability in the podinfo application (up to version 6.11.2). The issue exists in the /echo and /api/echo endpoints where the server echoes the request body directly in the HTTP response without setting explicit Content-Type or X-Content-Type-Options headers. Due to Go's content type detection, the response is served as text/html, enabling execution of injected script payloads in the context of the podinfo origin. This can be exploited by attackers who craft malicious cross-origin HTML pages with auto-submitting forms containing the payload, leading to reflected XSS when a victim visits the attacker's page.

Potential Impact

Successful exploitation allows an attacker to execute arbitrary scripts in the context of the podinfo origin for users who visit a malicious page crafted by the attacker. This can lead to typical reflected XSS impacts such as session hijacking, defacement, or other client-side attacks. However, the vulnerability requires user interaction (visiting a malicious page) and does not involve privilege escalation or direct system compromise. There are no known exploits in the wild at this time.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, users should consider implementing web application firewall (WAF) rules to detect and block suspicious requests to the /echo and /api/echo endpoints. Additionally, configuring reverse proxies or application servers to set explicit Content-Type and X-Content-Type-Options headers may help mitigate the risk. Avoid exposing these endpoints publicly if possible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-05-01T18:22:45.643Z
Cvss Version
4.0
State
PUBLISHED
Remediation Level
null

Threat ID: 6a05c8f4ec166c07b0dcb791

Added to database: 5/14/2026, 1:07:00 PM

Last enriched: 5/14/2026, 1:22:13 PM

Last updated: 5/14/2026, 3:14:45 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses