CVE-2026-40302
Description
zrok is software for sharing web services, files, and network resources. Prior to version 2.0.1, the proxyUi template engine uses Go's text/template (which performs no HTML escaping) instead of html/template. The GitHub OAuth callback handlers in both publicProxy and dynamicProxy embed the attacker-controlled refreshInterval query parameter verbatim into an error message when time.ParseDuration fails, and render that error unescaped into HTML. An attacker can deliver a crafted login URL to a victim; after the victim completes the GitHub OAuth flow, the callback page executes arbitrary JavaScript in the OAuth server's origin. Version 2.0.1 patches the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/openziti/zrokGo | <= 1.1.11 | — |
github.com/openziti/zrok/v2Go | < 2.0.1 | 2.0.1 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-4fxq-2x3x-6xqxghsaADVISORY
- github.com/openziti/zrok/security/advisories/GHSA-4fxq-2x3x-6xqxnvdVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-40302ghsaADVISORY
- github.com/openziti/zrok/releases/tag/v2.0.1nvdRelease NotesWEB
News mentions
0No linked articles in our index yet.