CVE-2026-1001
Stored XSS in Domoticz Web Interface Allows Admin Script Injection
Publication date: 2026-03-25
Last updated on: 2026-04-01
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| domoticz | domoticz | to 2026.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stored cross-site scripting (XSS) issue found in Domoticz versions prior to 2026.1. It exists in the Add Hardware and rename device features of the web interface. Authenticated administrators can exploit this by supplying crafted names containing script or HTML markup. The malicious code is then stored and rendered without proper output encoding, causing the script to execute in the browsers of users who view the affected page.
This allows attackers to perform unauthorized actions within the session context of the affected users.
How can this vulnerability impact me? :
The vulnerability can impact you by enabling attackers to execute arbitrary scripts in the browsers of users who view the affected pages. This can lead to unauthorized actions being performed within the session context of those users, potentially compromising the security and integrity of your system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
CVE-2026-1001 is a stored cross-site scripting (XSS) vulnerability that allows authenticated administrators to inject malicious scripts into the Domoticz web interface. This can lead to unauthorized actions within user sessions, potentially exposing sensitive information or enabling unauthorized control.
Such vulnerabilities can impact compliance with common standards and regulations like GDPR and HIPAA because they may lead to unauthorized access or disclosure of personal or protected health information through session hijacking or data manipulation.
Specifically, failure to properly validate and encode user input, resulting in stored XSS, can violate requirements for data protection, secure application design, and user privacy mandated by these regulations.
Therefore, this vulnerability highlights the need for proper input validation and output encoding to maintain compliance with security and privacy standards.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The vulnerability CVE-2026-1001 is a stored cross-site scripting (XSS) issue affecting the Add Hardware and rename device functionalities in Domoticz versions prior to 2026.1. Detection involves identifying if any device names or hardware entries contain malicious script or HTML markup that could be executed in the web interface.
Since exploitation requires authenticated administrator access and user interaction, detection can focus on reviewing device names or hardware configuration entries for suspicious script tags or HTML code.
Specific commands are not provided in the available resources, but general approaches include:
- Manually inspecting device names and hardware entries in the Domoticz web interface for suspicious markup.
- Using API calls or database queries (if accessible) to extract device names and scan for script tags or HTML elements.
- Monitoring web traffic for unusual payloads or script injections in requests related to hardware addition or device renaming.
What immediate steps should I take to mitigate this vulnerability?
To mitigate CVE-2026-1001, the primary step is to upgrade Domoticz to version 2026.1 or later, which includes improved XSS prevention in the web interface.
Additional immediate mitigation steps include:
- Restrict authenticated administrator access to trusted users only, as exploitation requires admin privileges.
- Avoid entering device names or hardware configuration inputs containing untrusted or suspicious script or HTML markup.
- Implement network-level protections such as web application firewalls (WAF) to detect and block malicious payloads targeting the vulnerable endpoints.
- Review and sanitize existing device names or hardware entries to remove any potentially malicious scripts.