VYPR
Medium severityNVD Advisory· Published May 14, 2026· Updated May 14, 2026

CVE-2026-21730

CVE-2026-21730

Description

Verba is affected by a Stored Cross-Site Scripting (XSS) vulnerability within its login logging mechanism. When an unauthenticated remote attacker attempts to log in using an incorrect username and password combination, the supplied username value is recorded in the application logs. Due to lack of input sanitization, an attacker can inject a malicious XSS payload into the username field. This payload will be executed in the context of the administrator’s browser when the admin accesses the web application's log viewer.

The vendor was notified early about this vulnerability, but didn't respond to our messages. This issue was fixed in version 10.0.6

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Verba before 10.0.6 has a stored XSS in its login logging; an unauthenticated attacker can inject a malicious payload that executes when an admin views the logs.

Vulnerability

All versions of Verint Verba prior to 10.0.6 contain a Stored Cross-Site Scripting (XSS) vulnerability (CWE-79) in the login logging mechanism [1]. When an unauthenticated remote attacker submits a login attempt with an arbitrary username and password combination, the supplied username value is recorded verbatim in the application logs without any sanitization [1]. The vulnerable code path is reachable via any standard login interface exposed by the product.

Exploitation

An attacker does not require authentication or any prior access to the network beyond the ability to reach the Verba login page [1]. The attacker crafts an HTTP request containing a JavaScript payload in the username field (e.g., ``). After the server logs the failed attempt, an administrator must access the web application's log viewer for the payload to execute [1]. No user interaction from the attacker is needed beyond the initial request; the trigger is the administrator opening the logs.

Impact

Successful exploitation results in arbitrary JavaScript execution in the context of the administrator’s browser session. This can lead to information disclosure (e.g., session cookies, CSRF tokens), further client-side attacks, or actions performed under the admin's privileges [1]. The scope is the administrator’s web session with the Verba application.

Mitigation

The vulnerability is fixed in Verba version 10.0.6 [1]. The vendor was notified but did not respond; however, the fix was included in that release [1]. All deployments running versions earlier than 10.0.6 should be upgraded immediately. No workaround is described in the available references.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.