Home

Description

podinfo through 6.11.2 contains a reflected cross-site scripting vulnerability in the /echo and /api/echo endpoints where the echoHandler writes request body content directly to the response without setting explicit Content-Type or X-Content-Type-Options headers. Attackers can craft cross-origin HTML pages with auto-submitting forms containing script payloads in the request body, which are served as text/html due to Go's content type detection, allowing the reflected script to execute in the podinfo origin context when victims visit the attacker's page.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-14 | Updated 2026-05-14 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
affected

Any version
affected

Credits

Niccolò Parlanti finder

References

github.com/...ies/blob/main/CVE-2026-43644/cve-2026-43644.md technical-description exploit

github.com/stefanprodan/podinfo/issues/474 issue-tracking

www.vulncheck.com/...podinfo-reflected-xss-via-echo-endpoint third-party-advisory

cve.org (CVE-2026-43644)

nvd.nist.gov (CVE-2026-43644)

Download JSON