CVE-2026-5808 PUBLISHED

openstatusHQ openstatus Onboarding Endpoint client.tsx cross site scripting

Assigner: VulDB
Reserved: 08.04.2026 Published: 08.04.2026 Updated: 08.04.2026

A vulnerability was detected in openstatusHQ openstatus up to 1b678e71a85961ae319cbb214a8eae634059330c. This impacts an unknown function of the file apps/dashboard/src/app/(dashboard)/onboarding/client.tsx of the component Onboarding Endpoint. The manipulation of the argument callbackURL results in cross site scripting. The attack may be launched remotely. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases. The patch is identified as 43d9b2b9ef8ae1a98f9bdc8a9f86d6a3dfaa2dfb. It is advisable to implement a patch to correct this issue. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X
CVSS Score: 5.3

Product Status

Vendor openstatusHQ
Product openstatus
Versions
  • Version 1b678e71a85961ae319cbb214a8eae634059330c is affected

Credits

  • trebledj (VulDB User) reporter
  • VulDB CNA Team coordinator

References

Problem Types

  • Cross Site Scripting CWE
  • Code Injection CWE