VYPR
Medium severityNVD Advisory· Published Feb 27, 2026· Updated Apr 15, 2026

CVE-2026-3327

CVE-2026-3327

Description

Authenticated Iframe Injection in Dato CMS Web Previews plugin. This vulnerability permits a malicious authenticated user to circumvent the restriction enforced on the configured frontend URL, enabling the loading of arbitrary external resources or origins. This issue affects Web Previews < v1.0.31.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Authenticated iframe injection in Dato CMS Web Previews allows bypass of frontend URL restriction, enabling arbitrary external resource loading.

Vulnerability

Description CVE-2026-3327 is an authenticated iframe injection vulnerability in the Dato CMS Web Previews plugin. The plugin allows authenticated users to preview frontend content via an embedded iframe, but the initial path parameter (passed via URL query string or the user's configured initial path) was not properly sanitized before being used as the iframe source. This oversight permits a malicious authenticated user to supply an arbitrary external URL, bypassing the intended restriction that the iframe should only load the configured frontend URL.

Exploitation

An attacker who has authenticated access to the Dato CMS Web Previews plugin can manipulate the path query parameter in the iframe state initialization. The vulnerable code directly passed the user-supplied path to the iframe without validation, allowing the loading of any external origin. The attack requires no additional privileges beyond being an authenticated user of the Web Previews plugin, making it a low-complexity exploit within the trusted user boundary.

Impact

By injecting an arbitrary external resource into the iframe, an attacker could perform content spoofing, potentially tricking other authenticated users into interacting with a malicious site. Additionally, if the injected resource executes scripts, it could lead to cross-origin information disclosure or session token theft within the context of the Dato CMS dashboard. The vulnerability is rated Medium severity due to the requirement of authentication and the potential for partial compromise of administrative interface security.

Mitigation

The issue has been addressed in Web Previews v1.0.31 by introducing the normalizePathForVisualEditing function, which sanitizes the path parameter against allowed origins and falls back to a safe default. All users are urged to upgrade to the latest version. No known workarounds exist beyond restricting authenticated access to trusted users [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

50