MEDIUMCVE-2026-5630CVSS 4.3

assafelovic gpt-researcher Report API app.py cross site scripting

Plataforma

python

Componente

assafelovic-gpt-researcher

Corrigido em

3.4.1

3.4.2

3.4.3

3.4.4

AI Confidence: highNVDEPSS 0.0%Revisado: mai. de 2026
Traduzindo para o seu idioma…

CVE-2026-5630 describes a cross-site scripting (XSS) vulnerability discovered in gpt-researcher, specifically impacting versions 3.4.0 through 3.4.3. This flaw resides within the Report API component, allowing an attacker to inject malicious scripts. The vulnerability is remotely exploitable and a public proof-of-concept exists, highlighting the potential for immediate exploitation. The project maintainers have not yet responded to the reported issue.

Python

Detecte esta CVE no seu projeto

Envie seu arquivo requirements.txt e descubra na hora se você está afetado.

Enviar requirements.txtFormatos suportados: requirements.txt · Pipfile.lock

Impacto e Cenários de Ataquetraduzindo…

Successful exploitation of CVE-2026-5630 allows an attacker to inject arbitrary JavaScript code into the gpt-researcher application. This could lead to a variety of malicious outcomes, including session hijacking, defacement of the application's user interface, and redirection to phishing sites. The attacker could potentially steal sensitive user data, such as API keys or authentication tokens, if the application handles such information. Given the remote nature of the vulnerability and the availability of a public exploit, the risk of exploitation is significant. The impact is amplified if the gpt-researcher application is exposed to the public internet or integrated with other systems.

Contexto de Exploraçãotraduzindo…

CVE-2026-5630 was publicly disclosed on 2026-04-06. A proof-of-concept exploit is publicly available, indicating a relatively high probability of exploitation. The vulnerability has been added to the NVD database. The lack of response from the project maintainers increases the risk of continued exploitation.

Quem Está em Riscotraduzindo…

Organizations and individuals using gpt-researcher versions 3.4.0 through 3.4.3, particularly those exposing the Report API to external users or systems, are at risk. Those relying on gpt-researcher for sensitive data processing or integration with critical infrastructure are especially vulnerable.

Passos de Detecçãotraduzindo…

• python / server: Examine the backend/server/app.py file for unsanitized user input. Use a code analysis tool to identify potential XSS vulnerabilities.

# Example: Check for user input in the Report API endpoint
import re
user_input = request.args.get('report_data')
if user_input:
  if not re.match(r'^[a-zA-Z0-9]+$', user_input):
    # Reject input if it contains non-alphanumeric characters
    return 'Invalid input'

• generic web: Monitor access logs for requests containing suspicious JavaScript code in the report_data parameter. Look for unusual URL encoded characters. • generic web: Check response headers for signs of XSS, such as the presence of injected JavaScript code in the HTML content.

Linha do Tempo do Ataque

  1. Disclosure

    disclosure

Inteligência de Ameaças

Status do Exploit

Prova de ConceitoDesconhecido
CISA KEVNO
Exposição na InternetAlta
Relatórios1 relatório de ameaça

EPSS

0.01% (percentil 1%)

CISA SSVC

Exploraçãopoc
Automatizávelno
Impacto Técnicopartial

Vetor CVSS

INTELIGÊNCIA DE AMEAÇAS· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R4.3MEDIUMAttack VectorNetworkComo o atacante alcança o alvoAttack ComplexityLowCondições necessárias para explorarPrivileges RequiredNoneNível de autenticação necessárioUser InteractionRequiredSe a vítima precisa tomar uma açãoScopeUnchangedImpacto além do componente afetadoConfidentialityNoneRisco de exposição de dados sensíveisIntegrityLowRisco de modificação não autorizada de dadosAvailabilityNoneRisco de interrupção de serviçonextguardhq.com · Pontuação Base CVSS v3.1
O que significam essas métricas?
Attack Vector
Rede — explorável remotamente pela internet. Sem acesso físico ou local necessário.
Attack Complexity
Baixa — sem condições especiais. O atacante pode explorar de forma confiável.
Privileges Required
Nenhum — sem autenticação necessária para explorar.
User Interaction
Necessária — a vítima deve abrir um arquivo, clicar em um link ou visitar uma página.
Scope
Inalterado — impacto limitado ao componente vulnerável.
Confidentiality
Nenhum — sem impacto na confidencialidade.
Integrity
Baixo — o atacante pode modificar alguns dados com alcance limitado.
Availability
Nenhum — sem impacto na disponibilidade.

Software Afetado

Componenteassafelovic-gpt-researcher
Fornecedorassafelovic
Faixa afetadaCorrigido em
3.4.0 – 3.4.03.4.1
3.4.1 – 3.4.13.4.2
3.4.2 – 3.4.23.4.3
3.4.3 – 3.4.33.4.4

Classificação de Fraqueza (CWE)

Linha do tempo

  1. Reservado
  2. Publicada
  3. EPSS atualizado
Sem correção — 48 dias desde a divulgação

Mitigação e Soluções Alternativastraduzindo…

The primary mitigation for CVE-2026-5630 is to upgrade to a patched version of gpt-researcher. As of this writing, no patched version has been released. Until a patch is available, consider implementing input validation and sanitization on the Report API endpoint to prevent the injection of malicious scripts. Web application firewalls (WAFs) configured to detect and block XSS payloads can provide an additional layer of defense. Monitor application logs for suspicious activity, such as unusual JavaScript execution patterns. Since no patch is available, careful review of the backend/server/app.py file for potential vulnerabilities is recommended.

Como corrigir

Atualize para uma versão corrigida de gpt-researcher. O desenvolvedor foi notificado do problema, mas ainda não forneceu uma solução. Consulte o repositório do projeto para obter atualizações ou soluções alternativas.

Boletim de Segurança CVE

Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.

Perguntas frequentestraduzindo…

What is CVE-2026-5630 — XSS in gpt-researcher?

CVE-2026-5630 is a cross-site scripting (XSS) vulnerability affecting gpt-researcher versions 3.4.0–3.4.3, allowing remote attackers to inject malicious scripts via the Report API.

Am I affected by CVE-2026-5630 in gpt-researcher?

You are affected if you are using gpt-researcher versions 3.4.0 through 3.4.3 and have not upgraded to a patched version (currently unavailable).

How do I fix CVE-2026-5630 in gpt-researcher?

Upgrade to a patched version of gpt-researcher when available. Until then, implement input validation and sanitization and consider using a WAF.

Is CVE-2026-5630 being actively exploited?

A public proof-of-concept exists, indicating a high probability of active exploitation.

Where can I find the official gpt-researcher advisory for CVE-2026-5630?

As of this writing, no official advisory has been released by the gpt-researcher project. Monitor the project's website and GitHub repository for updates.

Seu projeto está afetado?

Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.