HTML Injection Vulnerability in zrok Software by OpenZiti
CVE-2026-40302

6.1MEDIUM

Key Information:

Vendor

Openziti

Status
Vendor
CVE Published:
17 April 2026

What is CVE-2026-40302?

The zrok software, used for sharing web services and files, contains a critical vulnerability prior to version 2.0.1. The issue lies in the proxyUi template engine, which utilizes Go's text/template, failing to perform necessary HTML escaping. As a result, the GitHub OAuth callback handlers in publicProxy and dynamicProxy directly embed the attacker-controlled refreshInterval query parameter into an error message without proper sanitization. This vulnerability allows an attacker to craft a malicious login URL that can execute arbitrary JavaScript within the OAuth server's origin once the victim completes the authentication process. It is essential for users to upgrade to version 2.0.1 or later to mitigate this security risk.

Affected Version(s)

zrok < 2.0.1

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.