PatchSiren cyber security CVE debrief
CVE-2016-8213 Emc CVE debrief
CVE-2016-8213 describes a stored cross-site scripting (XSS) vulnerability affecting multiple EMC Documentum products and versions. The issue was publicly disclosed in the CVE record on 2017-01-23. NVD classifies it as CWE-79 and rates it Medium, with a CVSS 3.0 vector of AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. In practical terms, this is a web application content-injection problem that can affect users who load maliciously stored content in the affected interfaces.
- Vendor
- Emc
- Product
- CVE-2016-8213
- CVSS
- MEDIUM 6.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-23
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-23
- Advisory updated
- 2026-05-13
Who should care
Administrators and security teams responsible for EMC Documentum WebTop, TaskSpace, Capital Projects, or Documentum Administrator deployments should care most. Any environment that lets users create, edit, or view shared web content in these products should treat this as a meaningful web-layer risk.
Technical summary
The vulnerability is a stored XSS flaw in EMC Documentum WebTop 6.8 prior to P18 and 6.8.1 prior to P06; TaskSpace 6.7 SP3 prior to P02; Capital Projects 1.9 prior to P30 and 1.10 prior to P17; and Documentum Administrator 7.0, 7.1, and 7.2 prior to P18. NVD maps the weakness to CWE-79. The CVSS vector indicates a network-reachable issue that requires user interaction and can impact confidentiality and integrity through browser-side execution in a different security scope.
Defensive priority
Medium. This is not marked as Known Exploited in the supplied data, but it affects multiple enterprise products and can lead to client-side compromise when users open tainted content. Prioritize if any affected versions are internet-facing or used by privileged administrators.
Recommended defensive actions
- Upgrade each affected product to the vendor-fixed level listed in the CVE description or later.
- Inventory all EMC Documentum WebTop, TaskSpace, Capital Projects, and Documentum Administrator deployments to confirm version exposure.
- Review user-generated or persisted content paths for stored XSS sinks and remove suspicious injected content where feasible.
- Ensure application-side output encoding and input validation controls are applied consistently across affected workflows.
- Ask administrators and users to reauthenticate after remediation if there is any concern that stored XSS was used to hijack sessions or alter content.
- Monitor access and application logs around content creation and display workflows for signs of abnormal injected payloads or unexpected script-bearing input.
Evidence notes
All claims in this brief are based on the supplied CVE record, the NVD metadata embedded in the source item, and the linked official records. The published CVE date used for timing context is 2017-01-23T07:59:00.440Z; the supplied modified date is 2026-05-13T00:24:29.033Z. NVD lists CWE-79 and the CVSS 3.0 vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The affected products and version ranges are taken directly from the CVE description and NVD CPE criteria.
Official resources
-
CVE-2016-8213 CVE record
CVE.org
-
CVE-2016-8213 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
- Source reference
Publicly disclosed in the CVE record on 2017-01-23; the supplied NVD record was last modified on 2026-05-13. No KEV entry is indicated in the supplied data.