Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 05 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:* |
Tue, 27 Jan 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Igniterealtime
Igniterealtime openfire |
|
| Vendors & Products |
Igniterealtime
Igniterealtime openfire |
Mon, 26 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 26 Jan 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Openfire 4.6.0 contains a stored cross-site scripting vulnerability in the nodejs plugin that allows attackers to inject malicious scripts through the 'path' parameter. Attackers can craft a payload with script tags to execute arbitrary JavaScript in the context of administrative users viewing the nodejs configuration page. | |
| Title | Openfire 4.6.0 - 'path' Stored XSS | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:05:09.504Z
Reserved: 2026-01-26T14:18:25.794Z
Link: CVE-2020-36956
Updated: 2026-01-26T20:59:40.954Z
Status : Deferred
Published: 2026-01-26T18:16:26.313
Modified: 2026-04-15T00:35:42.020
Link: CVE-2020-36956
No data.
OpenCVE Enrichment
Updated: 2026-01-27T09:03:27Z