πŸ” CVE Alert

CVE-2026-31382

MEDIUM 6.1

Gainsight Assist reflected XSS/HTML injection

CVSS Score
6.1
EPSS Score
0.0%
EPSS Percentile
2th

The error_description parameter is vulnerable to Reflected XSS. An attacker can bypass the domain's WAF using a Safari-specific onpagereveal payload.

CWE CWE-79
Vendor gainsight
Product gainsight assist
Published Mar 20, 2026
Last Updated Mar 23, 2026
Stay Ahead of the Next One

Get instant alerts for gainsight gainsight assist

Be the first to know when new medium vulnerabilities affecting gainsight gainsight assist are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
Low

Affected Versions

Gainsight / Gainsight Assist
All versions affected

References

NVD β†— CVE.org β†— EPSS Data β†—
rapid7.com: https://www.rapid7.com/blog/post/ve-cve-2026-31381-cve-2026-31382-gainsight-assist-information-disclosure-xss-fixed/ communities.gainsight.com: https://communities.gainsight.com/community-news-2/recent-gainsight-assist-plugin-remediations-cve-2026-31381-and-cve-2026-31382-30587

Credits

Christopher O’Boyle, Cybersecurity Advisor at Rapid7