๐Ÿ” CVE Alert

CVE-2020-36956

MEDIUM 6.4

Openfire 4.6.0 - 'path' Stored XSS

CVSS Score
6.4
EPSS Score
0.0%
EPSS Percentile
0th

Openfire 4.6.0 contains a stored cross-site scripting vulnerability in the nodejs plugin that allows attackers to inject malicious scripts through the 'path' parameter. Attackers can craft a payload with script tags to execute arbitrary JavaScript in the context of administrative users viewing the nodejs configuration page.

CWE CWE-79
Vendor igniterealtime
Product openfire
Published Jan 26, 2026
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for igniterealtime openfire

Be the first to know when new medium vulnerabilities affecting igniterealtime openfire are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

igniterealtime / Openfire
0 โ‰ค 4.6.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
exploit-db.com: https://www.exploit-db.com/exploits/49229 github.com: https://github.com/igniterealtime/Openfire igniterealtime.org: https://www.igniterealtime.org/downloads/ vulncheck.com: https://www.vulncheck.com/advisories/openfire-path-stored-xss

Credits

j5s