CVE-2026-32859
Description
ByteDance DeerFlow versions prior to commit 5dbb362 contain a stored cross-site scripting vulnerability in the artifacts API that allows attackers to execute arbitrary scripts by uploading malicious HTML or script content as artifacts. Attackers can store malicious content that executes in the browser context when users view artifacts, leading to session compromise, credential theft, and arbitrary script execution.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in ByteDance DeerFlow artifacts API allows arbitrary script execution via malicious file upload.
Vulnerability
Overview
The ByteDance DeerFlow artifacts API, prior to commit 5dbb362, contains a stored cross-site scripting (XSS) vulnerability. The API allows users to upload files as artifacts, but does not enforce safe MIME types or force download for active content such as HTML, XHTML, or SVG files. As a result, an attacker can upload a file containing malicious JavaScript that is later served inline to users who view the artifact [1] [2].
Exploitation
Conditions
An attacker with the ability to upload artifacts to DeerFlow can craft a file with an extension like .html, .xhtml, or .svg that includes embedded scripts. When another user accesses the artifact via the API, the browser renders the content inline, executing the attacker's script. No authentication is required beyond the upload capability, and the attack can be triggered simply by viewing the artifact [2] [3].
Impact
Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's browser. This can lead to session hijacking, credential theft, defacement, or further actions against the DeerFlow instance. The vulnerability is rated Medium (CVSS 5.4) due to the need for user interaction and the attacker's required access to upload artifacts [3].
Mitigation
The vulnerability is patched in commit 5dbb362 [2]. The fix modifies the artifacts router to force download for active MIME types (e.g., text/html, image/svg+xml) rather than displaying them inline, preventing script execution. Users should update to a version containing this commit. No workarounds have been published [1] [3].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Bytedance Inc./DeerFlowv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.