CVE-2026-43644
podinfo 6.11.2 Reflected XSS via /echo Endpoint
CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th
podinfo through 6.11.2 contains a reflected cross-site scripting vulnerability in the /echo and /api/echo endpoints where the echoHandler writes request body content directly to the response without setting explicit Content-Type or X-Content-Type-Options headers. Attackers can craft cross-origin HTML pages with auto-submitting forms containing script payloads in the request body, which are served as text/html due to Go's content type detection, allowing the reflected script to execute in the podinfo origin context when victims visit the attacker's page.
| CWE | CWE-79 |
| Vendor | stefanprodan |
| Product | podinfo |
| Published | May 14, 2026 |
| Last Updated | May 14, 2026 |
Stay Ahead of the Next One
Get instant alerts for stefanprodan podinfo
Be the first to know when new medium vulnerabilities affecting stefanprodan podinfo are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Affected Versions
stefanprodan / podinfo
0 โค 6.11.2
References
Credits
Niccolo Parlanti