๐Ÿ” CVE Alert

CVE-2026-33506

HIGH 8.8

DOM-Based XSS in Ory Polis Login Page

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

Ory Polis, formerly known as BoxyHQ Jackson, bridges or proxies a SAML login flow to OAuth 2.0 or OpenID Connect. Versions prior to 26.2.0 contain a DOM-based Cross-Site Scripting (XSS) vulnerability in Ory Polis's login functionality. The application improperly trusts a URL parameter (`callbackUrl`), which is passed to `router.push`. An attacker can craft a malicious link that, when opened by an authenticated user (or an unauthenticated user that later logs in), performs a client-side redirect and executes arbitrary JavaScript in the context of their browser. This could lead to credential theft, internal network pivoting, and unauthorized actions performed on behalf of the victim. Version 26.2.0 contains a patch for the issue.

CWE CWE-87 CWE-601
Vendor ory
Product polis
Published Mar 26, 2026
Last Updated Mar 26, 2026
Stay Ahead of the Next One

Get instant alerts for ory polis

Be the first to know when new high vulnerabilities affecting ory polis are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
Low

Affected Versions

ory / polis
< 26.2.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/ory/polis/security/advisories/GHSA-3wjr-6gw8-9j22 github.com: https://github.com/ory/polis/releases/tag/v26.2.0