CVE-2026-45231
Deferred Deferred - Pending Action
Stored XSS in DumbAssets Asset Management System

Publication date: 2026-05-18

Last updated on: 2026-05-18

Assigner: VulnCheck

Description
DumbAssets through 1.0.11 contains a stored cross-site scripting vulnerability in asset fields including name, description, modelNumber, serialNumber, and tags that are stored without server-side sanitization and rendered using innerHTML without client-side escaping. Attackers can create or update assets with HTML or JavaScript payloads via the asset API endpoints to execute arbitrary scripts in the browsers of users viewing the asset list, and with Content-Security-Policy disabled, the injected scripts can make unrestricted connections to internal network services.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-18
Last Modified
2026-05-18
Generated
2026-05-20
AI Q&A
2026-05-19
EPSS Evaluated
2026-05-19
NVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-45231 is a stored cross-site scripting (XSS) vulnerability found in DumbAssets versions up to 1.0.11. It occurs because certain asset fields such as name, description, modelNumber, serialNumber, and tags are stored without server-side sanitization and are rendered using innerHTML without client-side escaping.

Attackers can exploit this by creating or updating assets with malicious HTML or JavaScript payloads via the asset API endpoints. When other users view the asset list, these scripts execute in their browsers.

If the Content-Security-Policy is disabled, the injected scripts can make unrestricted connections to internal network services, increasing the potential impact.


How can this vulnerability impact me? :

This vulnerability can lead to arbitrary script execution in the browsers of users who view the affected asset list. This can result in theft of user credentials, session hijacking, or unauthorized actions performed on behalf of the user.

Additionally, if Content-Security-Policy is disabled, the malicious scripts can make unrestricted connections to internal network services, potentially exposing sensitive internal resources or data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart