VYPR
Medium severity4.3NVD Advisory· Published Mar 27, 2026· Updated Apr 29, 2026

CVE-2026-4992

CVE-2026-4992

Description

A flaw has been found in wandb OpenUI up to 1.0. This affects the function create_share/get_share of the file backend/openui/server.py of the component HTMLAnnotator Component. Executing a manipulation of the argument ID can lead to HTML injection. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Unauthenticated HTML injection in wandb OpenUI's share functionality allows stored XSS leading to session hijacking and account takeover.

Vulnerability

Overview

A flaw in wandb OpenUI up to version 1.0 allows unauthenticated HTML injection via the create_share and get_share endpoints in backend/openui/server.py. The id argument is not validated, and the application fails to sanitize HTML input before saving or rendering it. This enables an attacker to inject arbitrary HTML or JavaScript into shared components [1].

Attack

Vector

The attack is performed remotely without authentication. The share endpoints lack the authentication middleware, unlike other endpoints such as chat_completions which verify the user session. An attacker can craft a request to create or overwrite a shared component by supplying a malicious html field in the JSON payload. The id parameter is attacker-controlled, allowing overwrite of any existing share by guessing or knowing the ID [1].

Impact

When a victim views the compromised share link, the injected script executes within an iframe that has allow-same-origin permissions. This allows the script to access parent.document.cookie, exposing the victim's session token. Successful exploitation leads to session hijacking and full account takeover [1].

Mitigation

The vendor was contacted but did not respond. No official patch is available as of the publication date. Users should restrict access to the OpenUI instance or implement external authentication and input sanitization until a fix is available [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.