Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4995: Cross Site Scripting in wandb OpenUI

0
Medium
VulnerabilityCVE-2026-4995cvecve-2026-4995
Published: Sat Mar 28 2026 (03/28/2026, 10:45:10 UTC)
Source: CVE Database V5
Vendor/Project: wandb
Product: OpenUI

Description

CVE-2026-4995 is a medium severity cross-site scripting (XSS) vulnerability found in wandb OpenUI version 1. 0, specifically within the frontend/public/annotator/index. html file's Window Message Event Handler. This vulnerability allows remote attackers to inject malicious scripts without requiring authentication, but user interaction is necessary to trigger the exploit. The vulnerability was publicly disclosed, and the vendor has not responded to the notification. Although no known exploits are currently active in the wild, the publicly available exploit code increases the risk of future attacks. The CVSS 4. 0 base score is 5. 1, reflecting moderate impact primarily on confidentiality and integrity with limited impact on availability. Organizations using wandb OpenUI 1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/28/2026, 11:06:06 UTC

Technical Analysis

CVE-2026-4995 is a cross-site scripting vulnerability identified in wandb OpenUI version 1.0, affecting the Window Message Event Handler component located in the frontend/public/annotator/index.html file. The vulnerability arises from improper sanitization or validation of input data processed by the Window Message Event Handler, allowing an attacker to inject and execute arbitrary JavaScript code in the context of the affected web application. This XSS flaw can be exploited remotely without requiring authentication, but it requires user interaction to trigger the malicious script execution. The vulnerability was publicly disclosed on March 28, 2026, with a CVSS 4.0 score of 5.1, indicating a medium severity level. The vendor was notified early but has not issued a patch or response, leaving the vulnerability unmitigated. Although no active exploits have been reported in the wild, the availability of exploit details increases the risk of exploitation. The vulnerability primarily impacts the confidentiality and integrity of user data by enabling script injection, potentially leading to session hijacking, data theft, or unauthorized actions within the application. The lack of a vendor patch necessitates that organizations implement alternative mitigations to reduce exposure.

Potential Impact

The primary impact of CVE-2026-4995 is the potential compromise of user confidentiality and integrity within wandb OpenUI environments. Successful exploitation could allow attackers to execute arbitrary scripts in users' browsers, leading to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the user. Although availability impact is minimal, the breach of trust and data integrity can have significant consequences, especially in environments where wandb OpenUI is used for machine learning experiment tracking and collaboration. Organizations relying on this tool may face data leakage, reputational damage, and potential compliance violations. The remote exploitability without authentication increases the attack surface, while the requirement for user interaction somewhat limits automated exploitation. The absence of vendor response and patches prolongs the window of vulnerability, increasing risk over time.

Mitigation Recommendations

Given the lack of an official patch from the vendor, organizations should implement the following specific mitigations: 1) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 2) Use web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the Window Message Event Handler. 3) Educate users to be cautious about interacting with untrusted links or content within the wandb OpenUI interface. 4) If feasible, isolate wandb OpenUI usage within segmented network environments to limit exposure. 5) Monitor application logs and network traffic for suspicious activities indicative of XSS exploitation attempts. 6) Consider deploying runtime application self-protection (RASP) solutions to detect and block XSS attacks in real time. 7) Engage with the vendor or community for updates or unofficial patches and consider contributing to open-source fixes if applicable. 8) Plan for an upgrade or migration to a patched or alternative solution once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-27T13:48:04.801Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c7b2942b68dbd88ee17702

Added to database: 3/28/2026, 10:51:00 AM

Last enriched: 3/28/2026, 11:06:06 AM

Last updated: 3/28/2026, 12:07:28 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses