CVE-2026-38936
Received Received - Intake
Reflected XSS in diskover-community ≀ 2.3.5 via namecontains Parameter

Publication date: 2026-04-27

Last updated on: 2026-04-27

Assigner: MITRE

Description
A reflected cross-site scripting (XSS) vulnerability exists in diskover-community <= 2.3.5 in public/selectindices.php via the namecontains parameter
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-27
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-04-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
diskoverdata diskover-community to 2.3.5 (inc)
diskover diskover_community to 2.3.5 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows theft of session cookies leading to full account takeover, which can result in unauthorized access to sensitive user data.

Such unauthorized access and potential data exposure could negatively impact compliance with data protection regulations like GDPR and HIPAA, which require safeguarding personal and sensitive information against unauthorized access.

However, the provided information does not explicitly mention compliance impacts or regulatory considerations.


Can you explain this vulnerability to me?

CVE-2026-38936 is a reflected Cross-Site Scripting (XSS) vulnerability in the diskover-community application, specifically in the file public/selectindices.php affecting versions up to and including 2.3.5.

The vulnerability occurs because the namecontains GET parameter is unsafely injected into two contexts without proper encoding: an HTML href attribute and a JavaScript window.location.href string.

This unsafe injection allows an attacker to craft a malicious URL that, when visited by an authenticated user, can execute arbitrary JavaScript code in the user's browser.

For example, an attacker can inject JavaScript that steals the user's session cookies, enabling session hijacking.


How can this vulnerability impact me? :

This vulnerability can lead to theft of session cookies, which allows an attacker to fully take over the victim's account.

It affects all authenticated users, including administrators, increasing the risk of privileged account compromise.

Exploitation requires the victim to be authenticated and to click on a maliciously crafted link.

Because the vulnerability exists in two injection points, the attack surface is larger, making exploitation easier.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the `namecontains` parameter in the `public/selectindices.php` endpoint for reflected cross-site scripting (XSS) behavior.

A practical approach is to craft a URL with a payload that triggers JavaScript execution, such as injecting a script alert or cookie exfiltration code, and observe if it executes in the browser.

Example command to test via curl (replace TARGET with your server address):

  • curl -i "http://TARGET/selectindices.php?forcedelindex=diskover-test&namecontains=\";alert(document.cookie);//"

If you have access to a browser, visiting the crafted URL below while authenticated can confirm the vulnerability by triggering an alert with the session cookie:

  • http://TARGET/selectindices.php?forcedelindex=diskover-test&namecontains=";alert(document.cookie);//

Monitoring web server logs for suspicious requests containing JavaScript payloads in the `namecontains` parameter can also help detect exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include sanitizing and encoding the `namecontains` parameter to prevent injection into HTML and JavaScript contexts.

  • For the JavaScript context, encode the parameter using `json_encode` to safely embed it in the string, e.g.: `window.location.href = "...&namecontains=" + <?php echo json_encode($_GET['namecontains']); ?> + "&reloadindices";`
  • For the HTML href attribute context, sanitize the parameter using `htmlspecialchars` with `ENT_QUOTES` and UTF-8 encoding, e.g.: `echo htmlspecialchars($_GET['namecontains'], ENT_QUOTES, 'UTF-8');`

Additionally, restrict access to authenticated users only and educate users to avoid clicking suspicious links.

If a patch or updated version is available from the vendor, apply it as soon as possible.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart