CVE-2019-20526
Description
Ignite Realtime Openfire 4.4.1 allows XSS via the setup/setup-datasource-standard.jsp password parameter.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Openfire 4.4.1 reflects XSS in setup-datasource-standard.jsp via the password parameter, allowing unauthenticated attackers to inject arbitrary JavaScript.
Vulnerability
Overview
Ignite Realtime Openfire 4.4.1 is vulnerable to reflected Cross-Site Scripting (XSS) in the setup wizard component. The attack occurs in setup/setup-datasource-standard.jsp through the password POST parameter, which is insufficiently sanitized before being reflected back to the user. This allows an attacker to inject arbitrary HTML and JavaScript code. [1][2]
Exploitation
Prerequisites
This vulnerability requires no authentication, as the setup wizard is typically accessible before the application is fully configured. An attacker can craft a malicious URL or form submission containing the XSS payload in the password field. For exploitation to succeed, the victim must be tricked into clicking the link or submitting the form, making this a user-interaction-dependent attack. The attack vector is network-based with low complexity. [2]
Impact
Successful exploitation enables an attacker to execute arbitrary script in the victim's browser within the context of the Openfire domain. According to the advisory, this can lead to session theft, credential exfiltration, or other actions performed on behalf of the victim. The CVSSv3 score is 6.1 (Medium) with the scope changed, indicating that the impact may extend beyond the vulnerable component. [2]
Mitigation
The vendor released a fix for this vulnerability on September 25, 2019, prior to the advisory publication on October 11, 2019. Administrators should update to Openfire version 4.4.2 or later. If updating is not immediately possible, restricting access to the setup wizard through network controls is advised. [2]
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.igniterealtime.openfire:parentMaven | < 4.4.2 | 4.4.2 |
Affected products
2- Ignite Realtime/Openfiredescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-5cg5-7vw6-jw4rghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-20526ghsaADVISORY
- www.netsparker.com/web-applications-advisories/ns-19-015-reflected-cross-site-scripting-in-openfireghsaWEB
- www.netsparker.com/web-applications-advisories/ns-19-015-reflected-cross-site-scripting-in-openfire/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.