Platform
python
Component
7b42be1da37af51a0cfba0866d100987
Fixed in
1.0.1
A security vulnerability has been identified in wandb OpenUI versions up to 1.0, specifically within the createshare/getshare function of the backend/openui/server.py file. This flaw allows for HTML injection through manipulation of the 'ID' argument, potentially enabling attackers to inject malicious content. The vulnerability is remotely exploitable and a public exploit is already available, highlighting the urgency of addressing this issue.
Successful exploitation of CVE-2026-4992 allows an attacker to inject arbitrary HTML into the wandb OpenUI interface. This could lead to various malicious outcomes, including phishing attacks, defacement of the user interface, and potentially the execution of JavaScript code within the context of the user's browser. While direct server-side code execution is unlikely, the injected HTML could be used to steal user credentials or redirect users to malicious websites. The blast radius extends to any user interacting with the compromised wandb OpenUI instance.
A public exploit for CVE-2026-4992 has been published, indicating a relatively high probability of exploitation. The vulnerability was disclosed on 2026-03-27. The vendor was contacted but did not respond, suggesting a potential lack of immediate patching support. It is not currently listed on CISA KEV as of this writing.
Exploit Status
EPSS
0.03% (9% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2026-4992 is to upgrade to a patched version of wandb OpenUI. As no fixed version is currently specified, it's crucial to monitor the wandb project's release notes for updates addressing this vulnerability. Until a patch is available, consider implementing input validation on the 'ID' argument within the createshare/getshare function to sanitize user-supplied data. Web application firewalls (WAFs) configured to detect and block HTML injection attempts can also provide an additional layer of defense. After upgrading, verify the fix by attempting to inject a simple HTML payload (e.g., <script>alert('XSS')</script>) through the createshare/getshare endpoint and confirming that it is properly sanitized.
Update the wandb OpenUI library to a version later than 1.0, if available. Otherwise, it is recommended to disable or remove the HTMLAnnotator Component until a patched version is released. Inspect and sanitize user inputs before passing them to the create_share/get_share function in server.py.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-4992 is a vulnerability in wandb OpenUI versions up to 1.0 that allows attackers to inject malicious HTML code by manipulating the 'ID' argument, potentially leading to phishing or defacement.
If you are using wandb OpenUI version 1.0, you are potentially affected by this vulnerability. Monitor the wandb project for updates and apply patches as soon as they are available.
The recommended fix is to upgrade to a patched version of wandb OpenUI. Until a patch is available, implement input validation on the 'ID' argument and consider using a WAF.
A public exploit exists, indicating a high probability of active exploitation. It's crucial to mitigate this vulnerability as quickly as possible.
Refer to the wandb project's release notes and security advisories for updates regarding CVE-2026-4992. Due to the lack of vendor response, information may be limited.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your requirements.txt file and we'll tell you instantly if you're affected.