Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4846: Cross Site Scripting in dameng100 muucmf

0
Medium
VulnerabilityCVE-2026-4846cvecve-2026-4846
Published: Thu Mar 26 2026 (03/26/2026, 05:31:37 UTC)
Source: CVE Database V5
Vendor/Project: dameng100
Product: muucmf

Description

CVE-2026-4846 is a cross-site scripting (XSS) vulnerability found in dameng100 muucmf version 1. 9. 5. 20260309. The vulnerability arises from improper handling of the 'keyword' argument in the file channel/admin. Account/autoReply. html, allowing remote attackers to inject malicious scripts. Exploitation does not require authentication but does require user interaction, such as clicking a crafted link. The vulnerability has a CVSS 4. 0 base score of 5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 06:15:59 UTC

Technical Analysis

CVE-2026-4846 is a reflected cross-site scripting (XSS) vulnerability identified in dameng100 muucmf version 1.9.5.20260309. The flaw exists in an unspecified function within the file channel/admin.Account/autoReply.html, where the 'keyword' parameter is not properly sanitized or encoded before being reflected in the web page output. This improper input validation allows remote attackers to inject malicious JavaScript code that executes in the context of the victim's browser when they interact with a crafted URL or input. The vulnerability requires no authentication, making it accessible to unauthenticated attackers, but it does require user interaction, such as clicking a malicious link or visiting a compromised page. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), and limited impact on integrity (VI:L), with no impact on confidentiality or availability. The vendor was contacted early but has not issued any patch or advisory, leaving the vulnerability unmitigated. While no known exploits have been reported in the wild, public disclosure increases the risk of exploitation attempts. XSS vulnerabilities like this can be leveraged for session hijacking, credential theft, phishing, or delivering malware payloads, posing a significant risk to users of the affected product.

Potential Impact

The primary impact of CVE-2026-4846 is the potential for attackers to execute arbitrary JavaScript code in the browsers of users interacting with the vulnerable muucmf interface. This can lead to session hijacking, theft of sensitive information such as cookies or credentials, defacement of web content, and facilitation of phishing attacks by manipulating the displayed content. Although the vulnerability does not directly compromise server confidentiality or availability, the indirect effects on user trust and data confidentiality can be significant. Organizations relying on dameng100 muucmf 1.9.5.20260309 may face reputational damage, user data compromise, and increased risk of further attacks leveraging stolen session tokens or credentials. The lack of vendor response and patch availability prolongs exposure, increasing the window for potential exploitation. Since the attack requires user interaction, social engineering or phishing campaigns could be used to increase success rates. Overall, the threat affects the integrity and confidentiality of user sessions and data, with moderate severity.

Mitigation Recommendations

To mitigate CVE-2026-4846, organizations should first verify if they are running the affected version 1.9.5.20260309 of dameng100 muucmf. In the absence of an official patch, immediate mitigation steps include implementing web application firewall (WAF) rules to detect and block suspicious input patterns targeting the 'keyword' parameter in the affected URL. Input validation and output encoding should be applied at the application level to sanitize user-supplied data, preventing script injection. Administrators should restrict access to the affected admin interface to trusted IP addresses or VPN users to reduce exposure. Educate users about the risks of clicking untrusted links and implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Monitoring web server logs for unusual requests targeting the vulnerable endpoint can help detect exploitation attempts early. Finally, maintain regular backups and prepare incident response plans to quickly address any successful attacks. Organizations should also engage with the vendor for updates and consider upgrading to newer, secure versions once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-25T14:51:29.579Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c4cbeaf4197a8e3be7e188

Added to database: 3/26/2026, 6:02:18 AM

Last enriched: 3/26/2026, 6:15:59 AM

Last updated: 3/26/2026, 7:06:34 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses