Description
A vulnerability was detected in openstatusHQ openstatus up to 1b678e71a85961ae319cbb214a8eae634059330c. This impacts an unknown function of the file apps/dashboard/src/app/(dashboard)/onboarding/client.tsx of the component Onboarding Endpoint. The manipulation of the argument callbackURL results in cross site scripting. The attack may be launched remotely. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases. The patch is identified as 43d9b2b9ef8ae1a98f9bdc8a9f86d6a3dfaa2dfb. It is advisable to implement a patch to correct this issue. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Problem types
Product status
Timeline
| 2026-04-08: | Advisory disclosed |
| 2026-04-08: | VulDB entry created |
| 2026-04-08: | VulDB entry last update |
Credits
trebledj (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/356245 (VDB-356245 | openstatusHQ openstatus Onboarding Endpoint client.tsx cross site scripting)
vuldb.com/vuln/356245/cti (VDB-356245 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/787321 (Submit #787321 | OpenStatus HQ OpenStatus 20260314 DOM-Based XSS, Open Redirect)
gist.github.com/TrebledJ/ab83abb1ca7ff6c1f39e16a37020f323
github.com/openstatusHQ/openstatus/pull/1981
github.com/...ommit/43d9b2b9ef8ae1a98f9bdc8a9f86d6a3dfaa2dfb
github.com/openstatusHQ/openstatus/