LOWCVE-2026-2972CVSS 2.4

a466350665 Smart-SSO 角色编辑 UserController.java save 跨站脚本漏洞

平台

java

组件

smart-sso

修复版本

2.1.1

2.1.2

AI Confidence: highNVDEPSS 0.0%已审阅: 2026年5月
正在翻译为您的语言…

CVE-2026-2972 describes a cross-site scripting (XSS) vulnerability discovered in Smart-SSO versions 2.1.0 through 2.1.1. This flaw resides within the Role Edit Page's Save function, allowing attackers to inject malicious scripts. Successful exploitation could lead to unauthorized access or modification of user data. The vulnerability is publicly disclosed and may be actively exploited.

Java / Maven

检测此 CVE 是否影响你的项目

上传你的 pom.xml 文件,立即知道是否受影响。

上传 pom.xml支持的格式: pom.xml · build.gradle

影响与攻击场景翻译中…

An attacker exploiting CVE-2026-2972 can inject arbitrary JavaScript code into the Smart-SSO application. This code could be executed in the context of a user's browser, potentially allowing the attacker to steal session cookies, redirect users to malicious websites, or deface the application. The impact is amplified if the application is used to manage sensitive user data or access critical systems. This XSS vulnerability could be leveraged for phishing attacks or to gain persistent access to the application.

利用背景翻译中…

This vulnerability has been publicly disclosed, increasing the likelihood of exploitation. The lack of a vendor response raises concerns about the timeliness of a patch. While the CVSS score is LOW, the potential for user data compromise and application defacement warrants immediate attention. No known active campaigns have been reported, but the public disclosure makes it a prime target for opportunistic attackers.

哪些人处于风险中翻译中…

Organizations relying on Smart-SSO for single sign-on and identity management are at risk. This includes companies with legacy Smart-SSO deployments, those using the Role Edit Page for administrative tasks, and those who have not implemented robust input validation practices.

检测步骤翻译中…

• java / server:

# Check for the vulnerable file
find /opt/smart-sso/smart-sso-server/src/main/java/openjoe/smart/sso/server/controller/admin/ -name UserController.java

• generic web:

# Check response headers for XSS indicators
curl -I https://your-smart-sso-instance/admin/role-edit | grep -i 'x-xss-protection'

攻击时间线

  1. Disclosure

    disclosure

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露

EPSS

0.03% (7% 百分位)

CISA SSVC

利用情况poc
可自动化no
技术影响partial

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R2.4LOWAttack VectorNetwork攻击者如何到达目标Attack ComplexityLow利用漏洞所需的条件Privileges RequiredHigh攻击所需的认证级别User InteractionRequired是否需要受害者采取行动ScopeUnchanged超出受影响组件的影响范围ConfidentialityNone敏感数据泄露风险IntegrityLow数据未授权篡改风险AvailabilityNone服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
Attack Complexity
低 — 无需特殊条件,可以稳定地利用漏洞。
Privileges Required
高 — 需要管理员或特权账户。
User Interaction
需要 — 受害者必须打开文件、点击链接或访问特制页面。
Scope
未改变 — 影响仅限于脆弱组件本身。
Confidentiality
无 — 无机密性影响。
Integrity
低 — 攻击者可修改部分数据,影响有限。
Availability
无 — 无可用性影响。

受影响的软件

组件smart-sso
供应商a466350665
影响范围修复版本
2.1.0 – 2.1.02.1.1
2.1.1 – 2.1.12.1.2

弱点分类 (CWE)

时间线

  1. 已保留
  2. 发布日期
  3. EPSS 更新日期
未修复 — 披露已90天

缓解措施和替代方案翻译中…

The primary mitigation for CVE-2026-2972 is to upgrade Smart-SSO to a version that addresses the vulnerability. As of this writing, no patched version has been released. Until a patch is available, implement strict input validation and output encoding on the Role Edit Page to sanitize user-supplied data. Consider using a Web Application Firewall (WAF) with XSS protection rules to filter out malicious requests. Regularly review and update security policies and procedures.

修复方法

升级 Smart-SSO 到 2.1.1 版本之后。如果不可用,请审查并清理 smart-sso-server/src/main/java/openjoe/smart/sso/server/controller/admin/UserController.java 文件的 Save 函数中的用户输入,以防止恶意代码注入 (code injection)。

CVE 安全通讯

漏洞分析和关键警报直接发送到您的邮箱。

常见问题翻译中…

What is CVE-2026-2972 — XSS in Smart-SSO 2.1.0-2.1.1?

CVE-2026-2972 is a cross-site scripting (XSS) vulnerability affecting Smart-SSO versions 2.1.0 through 2.1.1. It allows attackers to inject malicious scripts via the Role Edit Page.

Am I affected by CVE-2026-2972 in Smart-SSO 2.1.0-2.1.1?

If you are using Smart-SSO versions 2.1.0 or 2.1.1, you are potentially affected by this vulnerability. Upgrade as soon as a patch is available.

How do I fix CVE-2026-2972 in Smart-SSO 2.1.0-2.1.1?

Upgrade to a patched version of Smart-SSO. Until a patch is released, implement input validation and output encoding, and consider using a WAF.

Is CVE-2026-2972 being actively exploited?

While no active campaigns have been confirmed, the vulnerability is publicly disclosed and may be exploited by opportunistic attackers.

Where can I find the official Smart-SSO advisory for CVE-2026-2972?

Due to the lack of vendor response, an official advisory may not be available. Monitor security news sources and the Smart-SSO community for updates.

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。