PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-9260 Tenable CVE debrief

CVE-2016-9260 is a cross-site scripting (XSS) issue in Tenable Nessus that affects releases before 6.9. The vulnerability allows a remote authenticated user to inject arbitrary web script or HTML through handling of .nessus files. NVD maps the issue to CWE-79 and rates it as a medium-severity problem with network access, low privileges, required user interaction, and limited confidentiality and integrity impact.

Vendor
Tenable
Product
CVE-2016-9260
CVSS
MEDIUM 5.4
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-31
Original CVE updated
2026-05-13
Advisory published
2017-01-31
Advisory updated
2026-05-13

Who should care

Security teams operating Tenable Nessus, especially environments where authenticated users can upload, import, or otherwise process .nessus files. Administrators responsible for scanner management, report workflows, and web-based Nessus interfaces should prioritize review and patch verification.

Technical summary

The published data describes a stored or reflected XSS condition in Nessus-related handling of .nessus files. NVD associates the issue with CWE-79 and the CVSS 3.0 vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, indicating that exploitation is reachable over the network, requires low privileges and user interaction, and can affect the scope beyond the vulnerable component. The supplied NVD CPE criteria mark Nessus versions up to 6.8.1 as vulnerable, while the textual description states 'before 6.9.'

Defensive priority

Moderate. This is not marked as known-exploited in the supplied enrichment, but it is a real authenticated XSS issue in a security product and should be patched promptly because successful injection could expose session data or alter trusted content within administrative workflows.

Recommended defensive actions

  • Upgrade Tenable Nessus to a fixed release at or above 6.9, or the latest supported version available in your environment.
  • Review workflows that import or display .nessus files and treat file-derived content as untrusted input.
  • Validate that any web UI output associated with scan files is properly encoded and sanitized after patching.
  • Limit Nessus administrative access to trusted users and enforce least privilege for accounts that can upload or import content.
  • Confirm remediation by checking deployed Nessus version against vendor guidance and by reviewing the affected version range in the NVD record.

Evidence notes

All statements here are derived from the supplied CVE/NVD corpus: published date 2017-01-31, description of XSS in Nessus before 6.9, NVD CVSS vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, CWE-79 mapping, and NVD CPE criteria showing vulnerable Nessus versions through 6.8.1. Reference URLs in the corpus include the Tenable advisory and third-party advisories, but their page contents were not assumed beyond the metadata provided.

Official resources

Publicly disclosed on 2017-01-31. No Known Exploited Vulnerabilities entry was provided in the supplied enrichment.