CVE-2026-43644 PUBLISHED

podinfo 6.11.2 Reflected XSS via /echo Endpoint

Assigner: VulnCheck
Reserved: 01.05.2026 Published: 14.05.2026 Updated: 14.05.2026

podinfo through 6.11.2 contains a reflected cross-site scripting vulnerability in the /echo and /api/echo endpoints where the echoHandler writes request body content directly to the response without setting explicit Content-Type or X-Content-Type-Options headers. Attackers can craft cross-origin HTML pages with auto-submitting forms containing script payloads in the request body, which are served as text/html due to Go's content type detection, allowing the reflected script to execute in the podinfo origin context when victims visit the attacker's page.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
CVSS Score: 5.1

Product Status

Vendor stefanprodan
Product podinfo
Versions Default: affected
  • affected from 0 to 6.11.2 (incl.)

Credits

  • Niccolò Parlanti finder

References

Problem Types

  • Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE