CVE-2026-7308
Received Received - Intake
Stored XSS in Sonatype Nexus Repository via HTML Index

Publication date: 2026-05-11

Last updated on: 2026-05-11

Assigner: Sonatype

Description
An authenticated user with upload permission to a hosted repository can store content that causes arbitrary JavaScript to execute in the browser of any user who browses that repository directory via the HTML index page in Sonatype Nexus Repository versions 3.6.0 through versions before 3.92.0. This could allow the attacker to perform actions in the context of the victim's session.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-11
Last Modified
2026-05-11
Generated
2026-05-11
AI Q&A
2026-05-11
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
sonatype nexus_repository From 3.6.0 (inc) to 3.92.0 (exc)
sonatype nexus_repository From 3.6.0 (inc) to 3.91.x (inc)
sonatype nexus_repository 3.92.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-7308 is a Stored Cross-Site Scripting (XSS) vulnerability in Sonatype Nexus Repository versions 3.6.0 through 3.91.x. An authenticated user with upload permissions to a hosted repository can upload malicious JavaScript code. This code then executes in the browsers of other users who browse the repository directory via the HTML index page.

This means that when other users view the repository contents through the built-in HTML interface, the malicious script runs in their browser, potentially allowing the attacker to perform actions within the victim's session.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an attacker to execute arbitrary JavaScript in the context of a victim's session, potentially enabling unauthorized actions within the victim's Nexus Repository session.

Such unauthorized actions and potential session hijacking could lead to unauthorized access or manipulation of sensitive data, which may impact compliance with standards and regulations like GDPR or HIPAA that require protection of personal and sensitive information.

However, the provided information does not explicitly discuss the direct impact on compliance with these standards or any regulatory requirements.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves stored malicious JavaScript content uploaded by an authenticated user with upload permissions to a hosted repository in Sonatype Nexus Repository versions 3.6.0 through before 3.92.0. Detection involves identifying such malicious content or monitoring for suspicious activity related to repository browsing.

Since the vulnerability manifests when users browse the repository directory via the HTML index page, monitoring HTTP requests to the HTML browse endpoint for suspicious or unexpected JavaScript content can help detect exploitation attempts.

No specific commands are provided in the available resources. However, general approaches include:

  • Review upload logs to identify users with upload permissions and check for unusual or unexpected file uploads containing JavaScript.
  • Use web server or proxy logs to monitor requests to the HTML browse endpoint for suspicious query parameters or payloads.
  • Scan repository content for files containing embedded JavaScript that could be executed in browsers.

Sonatype recommends upgrading to version 3.92.0 or later to fix this vulnerability. If upgrading is not immediately possible, restricting upload permissions and using a reverse proxy or WAF to block or sanitize requests to the HTML browse endpoint are suggested mitigations.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to execute arbitrary JavaScript in the context of another user's browser session when they browse the affected repository directory.

  • The attacker can perform unauthorized actions within the victim's Nexus Repository session.
  • This could lead to data manipulation, unauthorized access, or other malicious activities performed as the victim user.

To exploit this, the attacker must have authenticated upload permissions, and the victim must browse the repository contents using the HTML index page.


What immediate steps should I take to mitigate this vulnerability?

To mitigate CVE-2026-7308, Sonatype recommends immediately upgrading Sonatype Nexus Repository to version 3.92.0 or later, where the vulnerability is fixed.

If immediate upgrading is not possible, temporary mitigations include:

  • Restrict upload permissions to trusted users only.
  • Configure a reverse proxy or Web Application Firewall (WAF) to block or sanitize requests to the HTML browse endpoint.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart