Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 14 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Salesforce
Salesforce workbench |
|
| CPEs | cpe:2.3:a:salesforce:workbench:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Salesforce
Salesforce workbench |
Tue, 07 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Forceworkbench
Forceworkbench forceworkbench |
|
| Vendors & Products |
Forceworkbench
Forceworkbench forceworkbench |
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Workbench is a suite of tools for administrators and developers to interact with Salesforce.com organizations via the Force.com APIs. Prior to 65.0.0, Workbench contains a reflected cross-site scripting vulnerability via the footerScripts parameter, which does not sanitize user-supplied input before rendering it in the page response. Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Workbench allows XSS Targeting Error Pages. This vulnerability is fixed in 65.0.0. | |
| Title | Reflected XSS in footer.php in Workbench Allows Attackers to Hijack Authenticated Sessions | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-07T14:18:59.617Z
Reserved: 2026-03-31T17:27:08.661Z
Link: CVE-2026-34951
Updated: 2026-04-07T14:18:48.440Z
Status : Analyzed
Published: 2026-04-06T16:16:38.170
Modified: 2026-04-14T20:28:26.730
Link: CVE-2026-34951
No data.
OpenCVE Enrichment
Updated: 2026-04-15T16:30:09Z