CVE-2026-26460
Received Received - Intake
HTML Injection in Vtiger CRM 8.4.0 Dashboard Module

Publication date: 2026-04-13

Last updated on: 2026-04-15

Assigner: MITRE

Description
A HTML Injection vulnerability exists in the Dashboard module of Vtiger CRM 8.4.0. The application fails to properly neutralize user-supplied input in the tabid parameter of the DashBoardTab view (getTabContents action), allowing an attacker to inject arbitrary HTML content into the dashboard interface. The injected content is rendered in the victim's browser
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-13
Last Modified
2026-04-15
Generated
2026-05-07
AI Q&A
2026-04-14
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
vtiger crm 8.4.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-80 The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a HTML Injection issue found in the Dashboard module of Vtiger CRM version 8.4.0. It occurs because the application does not properly neutralize user-supplied input in the 'tabid' parameter of the DashBoardTab view (specifically in the getTabContents action). As a result, an attacker can inject arbitrary HTML content into the dashboard interface, which is then rendered in the victim's browser.


How can this vulnerability impact me? :

This vulnerability allows an attacker to inject arbitrary HTML content into the dashboard interface viewed by other users. This can lead to various impacts such as the execution of malicious scripts, defacement of the dashboard, or manipulation of the displayed content. Ultimately, it can compromise the integrity and trustworthiness of the application interface and potentially lead to further attacks like phishing or session hijacking.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart