VYPR
Medium severity5.4NVD Advisory· Published Mar 27, 2026· Updated May 12, 2026

CVE-2026-32859

CVE-2026-32859

Description

ByteDance DeerFlow versions prior to commit 5dbb362 contain a stored cross-site scripting vulnerability in the artifacts API that allows attackers to execute arbitrary scripts by uploading malicious HTML or script content as artifacts. Attackers can store malicious content that executes in the browser context when users view artifacts, leading to session compromise, credential theft, and arbitrary script execution.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in ByteDance DeerFlow artifacts API allows arbitrary script execution via malicious file upload.

Vulnerability

Overview

The ByteDance DeerFlow artifacts API, prior to commit 5dbb362, contains a stored cross-site scripting (XSS) vulnerability. The API allows users to upload files as artifacts, but does not enforce safe MIME types or force download for active content such as HTML, XHTML, or SVG files. As a result, an attacker can upload a file containing malicious JavaScript that is later served inline to users who view the artifact [1] [2].

Exploitation

Conditions

An attacker with the ability to upload artifacts to DeerFlow can craft a file with an extension like .html, .xhtml, or .svg that includes embedded scripts. When another user accesses the artifact via the API, the browser renders the content inline, executing the attacker's script. No authentication is required beyond the upload capability, and the attack can be triggered simply by viewing the artifact [2] [3].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's browser. This can lead to session hijacking, credential theft, defacement, or further actions against the DeerFlow instance. The vulnerability is rated Medium (CVSS 5.4) due to the need for user interaction and the attacker's required access to upload artifacts [3].

Mitigation

The vulnerability is patched in commit 5dbb362 [2]. The fix modifies the artifacts router to force download for active MIME types (e.g., text/html, image/svg+xml) rather than displaying them inline, preventing script execution. Users should update to a version containing this commit. No workarounds have been published [1] [3].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.