CVE-2026-5630
Received Received - Intake
Remote Cross-Site Scripting in assafelovic GPT-Researcher Report API

Publication date: 2026-04-06

Last updated on: 2026-04-29

Assigner: VulDB

Description
A flaw has been found in assafelovic gpt-researcher up to 3.4.3. The impacted element is an unknown function of the file backend/server/app.py of the component Report API. This manipulation causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-06
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
assafelovic gpt-researcher to 3.4.3 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-5630 is a Stored Cross-Site Scripting (XSS) vulnerability in GPT Researcher (versions up to 3.4.3) affecting both backend and frontend components.

The vulnerability arises because the Report API backend endpoints accept unauthenticated POST or PUT requests containing JSON payloads with fields like orderedData[].content that can include malicious HTML or JavaScript.

These malicious payloads are stored without any sanitization and later rendered by the frontend using a markdown-to-HTML converter with sanitization disabled, and injected into the page using React's dangerouslySetInnerHTML, causing the malicious scripts to execute in users' browsers.

This flaw allows attackers to inject persistent malicious scripts into reports that execute when viewed by any user.


How can this vulnerability impact me? :

This vulnerability can have several serious impacts:

  • Attackers can hijack user sessions by stealing cookies, tokens, or credentials.
  • Attackers can tamper with reports by overwriting legitimate reports through unauthenticated API requests.
  • It enables wormable XSS attacks by automatically creating additional malicious reports.
  • Phishing attacks can be conducted by injecting fake login forms or redirects into reports.
  • Any user viewing a malicious report URL may have malicious scripts executed in their browser, leading to data theft or further compromise.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking for unauthorized POST or PUT requests to the Report API endpoints that accept unsanitized input, specifically targeting the /api/reports or /api/reports/{id} endpoints.

You can monitor network traffic or server logs for suspicious requests containing HTML or JavaScript payloads in the JSON fields such as orderedData[].content.

Example commands to detect such activity include:

  • Using grep on server logs to find suspicious payloads: grep -iE '<script|onerror|<img' /path/to/access.log
  • Using curl to test the API endpoints for vulnerability by sending a crafted payload: curl -X POST https://yourserver/api/reports -H 'Content-Type: application/json' -d '{"orderedData":[{"content":"<img src=x onerror=alert(1)>"}]}'
  • Using network monitoring tools (e.g., Wireshark or tcpdump) to capture and analyze HTTP requests to the vulnerable endpoints.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Implement input sanitization on the backend to clean any HTML or JavaScript content before storing it, using libraries such as bleach.
  • Enable sanitization in the frontend markdown rendering pipeline and use additional sanitization tools like DOMPurify before injecting HTML into the DOM.
  • Protect the Report API endpoints by adding authentication mechanisms (e.g., API keys or tokens) to prevent unauthenticated access.
  • Monitor and block suspicious requests attempting to inject malicious payloads.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows attackers to inject persistent malicious scripts into GPT Researcher reports, which execute in users' browsers. This can lead to session hijacking, data theft, and unauthorized access to sensitive information.

Such security risks can impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive data against unauthorized access and breaches.

Because the vulnerability enables unauthorized data manipulation and potential exposure of user credentials or tokens, it may result in violations of data protection requirements and lead to regulatory penalties.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart