This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
- **CVE-2026-22675**: Stored XSS in OCS Inventory NG π¨ - Affects v2.12.3 and earlier. - Malicious **JavaScript** stored & later executed. - π― Unauth attackers may run scripts in victims' browsers.β¦
- **Affected Product**: OCS Inventory NG (open-source IT asset mgmt) π₯οΈ - **Versions**: β€ 2.12.3 - **Component**: Server side (storage of User-Agent).
Q4What can hackers do? (Privileges/Data)
- Attackers need **low privileges** (PR:L) β - Can execute **arbitrary JS** in other users' sessions. - π₯ May access sensitive info, modify UI, steal cookies/tokens.β¦
- **Public PoC**: β None listed in data π - `pocs` array is empty. - No sign of wild exploitation yet. - But risk remains due to ease of finding vector.
Q7How to self-check? (Features/Scanning)
- **Self-check steps**: - π Review server logs for suspicious **User-Agent** strings. - Check stored inventory data for unexpected HTML/JS. - Use browser dev tools to inspect pages loading agent data.β¦