Home

Description

OCS Inventory NG Server version 2.12.3 and prior contain a stored cross-site scripting vulnerability that allows unauthenticated attackers to execute arbitrary JavaScript by submitting malicious User-Agent HTTP headers to the /ocsinventory endpoint. Attackers can register rogue agents or craft requests with malicious User-Agent values that are stored without sanitation and rendered with insufficient encoding in the web console, leading to arbitrary JavaScript execution in the browsers of authenticated users viewing the statistics dashboard.

PUBLISHED Reserved 2026-01-08 | Published 2026-04-06 | Updated 2026-04-07 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unaffected

Any version
affected

78faf2ca8b897141ba4d337d75692ab8e405bd4e (git)
unaffected

Credits

Alexandre Nesic (@_atsika) at Quarkslab finder

References

github.com/OCSInventory-NG/OCSInventory-Server/pull/483 issue-tracking

github.com/...ommit/78faf2ca8b897141ba4d337d75692ab8e405bd4e patch

www.vulncheck.com/...ory-ng-server-stored-xss-via-user-agent third-party-advisory

cve.org (CVE-2026-22675)

nvd.nist.gov (CVE-2026-22675)

Download JSON