CVE-2026-44371
Description
Open OnDemand is an open-source high-performance computing portal. Prior to 4.0.11, 4.1.5, and 4.2.2, specially crafted filenames can execute javascript in the file browser This vulnerability is fixed in 4.0.11, 4.1.5, and 4.2.2.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A stored XSS vulnerability in Open OnDemand allows arbitrary JavaScript execution via specially crafted filenames in the file browser, fixed in versions 4.0.11, 4.1.5, and 4.2.2.
Open OnDemand suffers from a stored cross-site scripting (XSS) vulnerability in its file browser component. The root cause is that filenames are not properly sanitized before rendering, allowing an attacker to inject arbitrary JavaScript code through specially crafted filenames [1].
Exploitation requires an attacker to have the ability to create or upload files with malicious names on the Open OnDemand instance. When other users browse the file system using the file browser, the crafted filename triggers execution of the injected JavaScript in their browsers. The attack can be performed without elevated privileges, as users can store files in their own directories [1].
Successful exploitation leads to arbitrary JavaScript execution in the context of the victim's session. This can result in theft of authentication tokens, data exfiltration, or other actions performed on behalf of the victim. The vulnerability affects all versions prior to 4.0.11, 4.1.5, and 4.2.2 [1].
The issue has been addressed in versions 4.0.11, 4.1.5, and 4.2.2. Users are advised to upgrade to a fixed version. No workaround is mentioned in the advisory [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: prior to 4.0.11, 4.1.5, and 4.2.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.