CVE-2026-8080
Awaiting Analysis Awaiting Analysis - Queue
Stored XSS in MISP Template Engine

Publication date: 2026-05-07

Last updated on: 2026-05-07

Assigner: 5a6e4751-2f3f-4070-9419-94fb35b644e8

Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in misp allows Stored XSS. This issue affects MISP before 2.5.37. A stored cross-site scripting vulnerability exists in the template element attribute handling logic. The application accepted arbitrary values for the TemplateElementAttribute type and category fields without validating them against the known MISP attribute type and category definitions.Β An attacker with permission to create or modify template element attributes could store a crafted type value. This affects the old templating (not more accessible in 2.5.37) engine from MISP which will be removed in 2.5.38
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-07
Last Modified
2026-05-07
Generated
2026-05-07
AI Q&A
2026-05-07
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
misp misp to 2.5.37 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a stored Cross-Site Scripting (XSS) issue in the MISP platform before version 2.5.37. It occurs because the application accepts arbitrary values for the TemplateElementAttribute type and category fields without validating them against known attribute type and category definitions. An attacker with permission to create or modify template element attributes can store malicious code in these fields, which can then be executed when the data is viewed, leading to XSS attacks.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how the stored cross-site scripting (XSS) vulnerability in MISP affects compliance with common standards and regulations such as GDPR or HIPAA.


How can this vulnerability impact me? :

This vulnerability can allow an attacker with limited permissions to inject malicious scripts into the MISP platform's templates. When other users view these templates, the malicious scripts can execute in their browsers, potentially leading to unauthorized actions such as session hijacking, data theft, or performing actions on behalf of the user without their consent.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the stored Cross-Site Scripting (XSS) vulnerability in MISP, you should upgrade to version 2.5.37 or later, as the old templating engine vulnerable to this issue is removed in version 2.5.38.

The vulnerability was fixed by adding validation in the TemplateElementAttribute model to ensure that the 'type' and 'category' fields are checked against predefined valid definitions, preventing arbitrary values that could lead to XSS.

Additionally, proper encoding was added in the template editing view to prevent XSS attacks through improperly handled attribute types.

  • Upgrade your MISP installation to version 2.5.37 or later.
  • Apply the security patch that validates TemplateElementAttribute fields as described in the fix.
  • Avoid using the old templating engine which is removed in version 2.5.38.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is a stored Cross-Site Scripting (XSS) issue in the MISP platform affecting template element attribute handling. Detection involves identifying if your MISP instance is running a version before 2.5.37 and if it allows creation or modification of template element attributes with arbitrary 'type' or 'category' values.

Since this vulnerability is related to improper input validation in the web application, network-level detection commands are not straightforward. Instead, detection should focus on inspecting the MISP database or application logs for suspicious or unexpected attribute types or categories in template elements.

Suggested approach to detect the vulnerability:

  • Check the MISP version: Ensure your MISP instance is version 2.5.37 or later, as the vulnerability affects versions before 2.5.37.
  • Query the database for template element attributes with unexpected or arbitrary 'type' or 'category' values that do not match known MISP attribute type and category definitions.
  • Review application logs or audit trails for creation or modification of template element attributes by users with permission to do so.

No specific network commands or signatures are provided in the available resources to detect exploitation attempts. Detection is primarily through version checking and database inspection.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart