VYPR
Unrated severityNVD Advisory· Published Mar 24, 2014· Updated May 6, 2026

CVE-2014-2586

CVE-2014-2586

Description

Cross-site scripting (XSS) vulnerability in the login audit form in McAfee Cloud Single Sign On (SSO) allows remote attackers to inject arbitrary web script or HTML via a crafted password.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

McAfee Cloud SSO login audit form accepts crafted passwords that trigger reflected XSS, allowing unauthenticated attackers to inject script or HTML.

Vulnerability

The McAfee Cloud Single Sign On (SSO) login audit form is vulnerable to cross-site scripting (XSS) due to insufficient sanitization of the password field. When a crafted password containing JavaScript or HTML is submitted, the response echoes the unsanitized input in the audit log display. This issue affects McAfee Cloud SSO versions prior to the fix referenced in the disclosure [1][2]. The vulnerability is unauthenticated and reachable from the login page.

Exploitation

An attacker only needs network access to the McAfee Cloud SSO login interface. No authentication is required. The attacker crafts a malicious password string containing web script or HTML, such as ``, and submits the login form. The application reflects the crafted input in the audit log page without proper encoding, causing the script to execute in the context of the victim's browser when the audit log is viewed by an administrator [1][2].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript or HTML in the browser of any administrator who views the login audit form. This can lead to session hijacking, stealing sensitive credentials, or performing actions on behalf of the administrator. The attack requires no privileges and compromises the confidentiality and integrity of the admin session [1][2].

Mitigation

McAfee has not released a public patch advisory as of the initial disclosure date (March 2014). The available references do not provide a fixed version number. Users should apply vendor-supplied updates if available, restrict access to the login audit interface, and implement input validation for the password field as a workaround [1][2].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.