CVE-2026-30082
Received Received - Intake
Stored XSS in IngEstate Server Edit Feature Allows Script Injection

Publication date: 2026-03-30

Last updated on: 2026-03-30

Assigner: MITRE

Description
Multiple stored cross-site scripting (XSS) vulnerabilities in the Edit feature of the Software Package List page of IngEstate Server v11.14.0 allow attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the About application, What's news, or Release note parameters.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-30
Last Modified
2026-03-30
Generated
2026-05-07
AI Q&A
2026-03-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ingestate server 11.14.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-30082 is a stored cross-site scripting (XSS) vulnerability found in IngEstate Server version 11.14.0. It affects the Edit feature on the Software Package List page, where an authenticated user can inject malicious JavaScript code into parameters such as "About application," "What's news," or "Release note."

Once the malicious script is injected, it is stored on the server and executed automatically in the browsers of other users who view these sections, allowing attackers to run arbitrary web scripts or HTML.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The stored cross-site scripting (XSS) vulnerability in IngEstate Server v11.14.0 allows attackers to execute arbitrary scripts in the browsers of users who view compromised content. This can lead to session hijacking, credential theft, and unauthorized actions performed on behalf of victims.

Such impacts can compromise the confidentiality and integrity of user data, which are critical requirements under common standards and regulations like GDPR and HIPAA. Specifically, unauthorized access to personal or sensitive information due to this vulnerability could result in non-compliance with data protection and privacy obligations.

Therefore, organizations using the affected software may face increased risk of violating these regulations if the vulnerability is exploited and not properly mitigated.


How can this vulnerability impact me? :

This vulnerability allows attackers to execute arbitrary JavaScript code in the browsers of users who view the compromised Software Package information. This can lead to serious security issues such as session hijacking, credential theft, and unauthorized actions performed on behalf of the victim.

All users who access the affected sections of the IngEstate Server are at risk if the vulnerability is exploited.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking for malicious JavaScript payloads injected into the parameters "About application," "What's news," or "Release note" on the Software Package List page of IngEstate Server v11.14.0.

Specifically, monitoring or inspecting API requests to the endpoint `PUT /emgui/rest/appDatasheet//?full=true` for suspicious payloads can help identify exploitation attempts.

Commands to detect this might include using web proxy tools or curl to fetch and inspect the content of these parameters for injected scripts.

  • Use curl to retrieve the Software Package List page and search for suspicious script tags or payloads: `curl -k -u <user>:<password> https://<server>/emgui/rest/appDatasheet//?full=true`
  • Use web application security scanners or proxy tools (e.g., Burp Suite, OWASP ZAP) to intercept and analyze requests to the Edit feature and look for injected JavaScript.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the Edit feature on the Software Package List page to trusted and authenticated users only.

Additionally, review and sanitize all inputs to the "About application," "What's news," and "Release note" parameters to prevent injection of malicious scripts.

If possible, apply any available patches or updates from the vendor addressing this vulnerability.

As a temporary measure, monitor and audit logs for suspicious activity related to the API endpoint `PUT /emgui/rest/appDatasheet//?full=true`.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart