CVE-2026-1011
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-16

Last updated on: 2026-01-16

Assigner: Altium

Description
A stored cross-site scripting (XSS) vulnerability exists in the Altium Support Center AddComment endpoint due to missing server-side input sanitization. Although the client interface applies HTML escaping, the backend accepts and stores arbitrary HTML and JavaScript supplied via modified POST requests. The injected content is rendered verbatim when support cases are viewed by other users, including support staff with elevated privileges, allowing execution of arbitrary JavaScript in the victim’s browser context.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-16
Last Modified
2026-01-16
Generated
2026-05-06
AI Q&A
2026-01-16
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
altium altium_support_center *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-116 The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a stored cross-site scripting (XSS) issue in the Altium Support Center's AddComment endpoint. It occurs because the server does not properly sanitize input on the backend, allowing attackers to submit arbitrary HTML and JavaScript via modified POST requests. Although the client interface escapes HTML, the backend stores and later renders this malicious content exactly as submitted when support cases are viewed by other users, including privileged support staff. This enables execution of arbitrary JavaScript in the browsers of those users.


How can this vulnerability impact me? :

The vulnerability can lead to execution of arbitrary JavaScript code in the browsers of users who view the affected support cases, including support staff with elevated privileges. This can result in theft of sensitive information, session hijacking, unauthorized actions performed on behalf of users, and potential compromise of user accounts or internal systems.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart