Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4fxq-2x3x-6xqx | zrok: Reflected XSS in GitHub OAuth callback via unsanitized refreshInterval error rendering |
Thu, 23 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netfoundry
Netfoundry zrok |
|
| CPEs | cpe:2.3:a:netfoundry:zrok:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Netfoundry
Netfoundry zrok |
Mon, 20 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openziti
Openziti zrok |
|
| Vendors & Products |
Openziti
Openziti zrok |
Sun, 19 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | zrok is software for sharing web services, files, and network resources. Prior to version 2.0.1, the proxyUi template engine uses Go's text/template (which performs no HTML escaping) instead of html/template. The GitHub OAuth callback handlers in both publicProxy and dynamicProxy embed the attacker-controlled refreshInterval query parameter verbatim into an error message when time.ParseDuration fails, and render that error unescaped into HTML. An attacker can deliver a crafted login URL to a victim; after the victim completes the GitHub OAuth flow, the callback page executes arbitrary JavaScript in the OAuth server's origin. Version 2.0.1 patches the issue. | |
| Title | zrok has reflected XSS in GitHub OAuth callback via unsanitized refreshInterval error rendering | |
| Weaknesses | CWE-116 CWE-79 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-18T03:07:10.092Z
Reserved: 2026-04-10T20:22:44.036Z
Link: CVE-2026-40302
Updated: 2026-04-18T03:07:06.451Z
Status : Analyzed
Published: 2026-04-17T21:16:34.997
Modified: 2026-04-23T18:32:53.020
Link: CVE-2026-40302
No data.
OpenCVE Enrichment
Updated: 2026-04-20T14:59:34Z
Github GHSA