Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-22675 β€” AI Deep Analysis Summary

CVSS 5.4 Β· Medium

Q1What is this vulnerability? (Essence + Consequences)

- **CVE-2026-22675**: Stored XSS in OCS Inventory NG 🚨 - Affects v2.12.3 and earlier. - Malicious **JavaScript** stored & later executed. - 🎯 Unauth attackers may run scripts in victims' browsers.…

Q2Root Cause? (CWE/Flaw)

- **Root Cause**: Stored Cross-Site Scripting flaw πŸ” - Likely **CWE-79**: Improper neutralization of input during web page generation. - Input from **User-Agent** not sanitized properly.…

Q3Who is affected? (Versions/Components)

- **Affected Product**: OCS Inventory NG (open-source IT asset mgmt) πŸ–₯️ - **Versions**: ≀ 2.12.3 - **Component**: Server side (storage of User-Agent).

Q4What can hackers do? (Privileges/Data)

- Attackers need **low privileges** (PR:L) βœ… - Can execute **arbitrary JS** in other users' sessions. - πŸ’₯ May access sensitive info, modify UI, steal cookies/tokens.…

Q5Is exploitation threshold high? (Auth/Config)

- **Exploitation threshold**: LOW ⚠️ - **Auth required**: Yes (PR:L = Low auth level). - Triggered via **User-Agent** header β†’ stored β†’ later rendered. - 🧩 No special config needed. Common web interaction (UI:R).

Q6Is there a public Exp? (PoC/Wild Exploitation)

- **Public PoC**: ❌ None listed in data πŸ” - `pocs` array is empty. - No sign of wild exploitation yet. - But risk remains due to ease of finding vector.

Q7How to self-check? (Features/Scanning)

- **Self-check steps**: - πŸ”Ž Review server logs for suspicious **User-Agent** strings. - Check stored inventory data for unexpected HTML/JS. - Use browser dev tools to inspect pages loading agent data.…

Q8Is it fixed officially? (Patch/Mitigation)

- **Official fix**: βœ… YES πŸ›‘οΈ - Patch in commit `78faf2ca` (GitHub). - PR #483 tracks issue. - Update to patched version to remove vuln.

Q9What if no patch? (Workaround)

- **No patch workaround**: - Sanitize **User-Agent** before storing 🧼. - Encode output when rendering stored agent data. - Apply strict CSP headers 🚧 to block inline JS exec.…

Q10Is it urgent? (Priority Suggestion)

- **Urgency**: HIGH 🚨 - CVSS: AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N - Scope change (S:C) = impact beyond vulnerable component. - πŸ’‘ Fix ASAP if using ≀ v2.12.3. - Prevent session/data compromise.