PatchSiren cyber security CVE debrief
CVE-2026-42157 reconurge CVE debrief
CVE-2026-42157 is a stored cross-site scripting issue in Flowsint, an open-source OSINT graph exploration tool. A remote attacker can create a map node with a malicious label containing arbitrary HTML. When a user opens the map tab and selects the node marker, the application renders that HTML, which can trigger stored XSS. The issue is fixed in Flowsint 1.2.3.
- Vendor
- reconurge
- Product
- flowsint
- CVSS
- MEDIUM 5.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-12
- Original CVE updated
- 2026-05-18
- Advisory published
- 2026-05-12
- Advisory updated
- 2026-05-18
Who should care
Organizations and analysts using Flowsint prior to 1.2.3, especially deployments where map nodes or labels can be created from untrusted or semi-trusted data. Security teams should pay particular attention if Flowsint is used in collaborative investigation workflows.
Technical summary
The vulnerability is a CWE-79 HTML injection / stored XSS condition in Flowsint’s map node label rendering path. According to the advisory, a remote attacker can supply a node label containing arbitrary HTML. When the map tab is selected and a map node marker is clicked/selected, the stored content is rendered in the UI instead of being safely escaped, allowing attacker-controlled script-bearing markup to execute in the victim’s browser. The published fix is in version 1.2.3.
Defensive priority
Medium. The issue is network-reachable and can affect browser sessions, but it requires a user to interact with the affected map view and depends on malicious content being present in the dataset.
Recommended defensive actions
- Upgrade Flowsint to version 1.2.3 or later.
- Review existing map nodes and labels for untrusted or unexpected HTML content.
- Ensure labels are rendered as text or safely escaped rather than interpreted as HTML.
- Restrict who can create or modify nodes if collaborative data entry is enabled.
- Inspect affected deployments for any signs that malicious labels may already have been stored.
Evidence notes
The CVE description states that prior to 1.2.3, a remote attacker can create a map node with a malicious label containing arbitrary HTML, and that selecting the map tab and node marker renders the HTML, potentially causing stored XSS. The source metadata lists CWE-79 and points to the GitHub Security Advisory GHSA-gj93-2vcq-729w. NVD records the vulnerability as CVSS 4.0 vector AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N and currently shows vulnStatus as Deferred. The CVE was published on 2026-05-12 and modified on 2026-05-18.
Official resources
-
CVE-2026-42157 CVE record
CVE.org
-
CVE-2026-42157 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
Publicly disclosed in the CVE/NVD record on 2026-05-12, with supporting GitHub Security Advisory GHSA-gj93-2vcq-729w. NVD metadata was last modified on 2026-05-18 and currently marks the vulnerability as Deferred.