Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-cpm7-cfpx-3hvp | Emissary has Stored XSS via Navigation Template Link Injection |
Mon, 27 Apr 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nsa
Nsa emissary |
|
| CPEs | cpe:2.3:a:nsa:emissary:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Nsa
Nsa emissary |
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nationalsecurityagency
Nationalsecurityagency emissary |
|
| Vendors & Products |
Nationalsecurityagency
Nationalsecurityagency emissary |
Wed, 08 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, Mustache navigation templates interpolated configuration-controlled link values directly into href attributes without URL scheme validation. An administrator who could modify the navItems configuration could inject javascript: URIs, enabling stored cross-site scripting (XSS) against other authenticated users viewing the Emissary web interface. This vulnerability is fixed in 8.39.0. | |
| Title | Emissary has Stored XSS via Navigation Template Link Injection | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-08T14:57:05.392Z
Reserved: 2026-04-03T20:09:02.826Z
Link: CVE-2026-35571
Updated: 2026-04-08T14:57:00.714Z
Status : Analyzed
Published: 2026-04-07T16:16:29.920
Modified: 2026-04-27T14:37:28.970
Link: CVE-2026-35571
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:48:13Z
Github GHSA