VYPR
Moderate severityNVD Advisory· Published May 4, 2023· Updated Jan 29, 2025

CVE-2023-30093

CVE-2023-30093

Description

A cross-site scripting (XSS) vulnerability in Open Networking Foundation ONOS from version v1.9.0 to v2.7.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the url parameter of the API documentation dashboard.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

ONOS SDN controller versions 1.9.0 through 2.7.0 contain a stored XSS in the API documentation dashboard via the url parameter, enabling arbitrary script execution.

Vulnerability

Overview Open Networking Foundation ONOS (Open Network Operating System) versions 1.9.0 through 2.7.0 contain a cross-site scripting (XSS) vulnerability in the API documentation dashboard. The url parameter fails to properly sanitize user-supplied input, allowing an attacker to inject arbitrary web scripts or HTML [1].

Exploitation

An attacker with access to the ONOS API dashboard can craft a malicious payload and inject it into the url parameter. The XSS triggers when a victim visits the affected page, executing the attacker's script in the context of the ONOS web interface. No authentication is required for this injection vector, as the API documentation endpoint is typically exposed without access controls [1].

Impact

Successful exploitation enables arbitrary JavaScript execution within the victim's browser session on the same domain. This can lead to session hijacking, credential theft, defacement, or redirection to malicious sites. The attacker may also leverage the XSS to interact with ONOS northbound REST APIs, potentially altering network configuration or exfiltrating sensitive data [1][2].

Mitigation

As of the publication date (2023-05-04), no patch has been mentioned for this specific CVE. Users are advised to restrict network access to the API documentation dashboard, apply input validation, or upgrade to a patched version if released later. The vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities (KEV) catalog [1][2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.onosproject:onos-archetypesMaven
>= 1.9.0, <= 2.7.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.