{"api_version":"1","generated_at":"2026-04-26T07:57:30+00:00","cve":"CVE-2026-4313","urls":{"html":"https://cve.report/CVE-2026-4313","api":"https://cve.report/api/cve/CVE-2026-4313.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-4313","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-4313"},"summary":{"title":"Stored XSS in AdaptiveGRC","description":"AdaptiveGRC is vulnerable to Stored XSS via text type fields across the forms. Authenticated attacker can replace the value of the text field in the HTTP POST request. Improper parameter validation by the server results in arbitrary JavaScript execution in the victim's browser.\nCritically, this may allow the attacker to obtain the administrator authentication token and perform arbitrary actions with administrative privileges, which could lead to further compromise.\n\nThis issue occurs in versions released before December 2025.","state":"PUBLISHED","assigner":"CERT-PL","published_at":"2026-04-24 12:17:07","updated_at":"2026-04-24 14:39:28"},"problem_types":["CWE-79","CWE-79 CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')"],"metrics":[{"version":"4.0","source":"cvd@cert.pl","type":"Secondary","score":"2.4","severity":"LOW","vector":"CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":2.4,"baseSeverity":"LOW","attackVector":"ADJACENT","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"PASSIVE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"CVSS","score":"2.4","severity":"LOW","vector":"CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N","data":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"ADJACENT","baseScore":2.4,"baseSeverity":"LOW","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","userInteraction":"PASSIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnerabilityResponseEffort":"NOT_DEFINED"}}],"references":[{"url":"https://adaptivegrc.com/pl/wszystkie-procesy-grc-w-jednym-narzedziu/","name":"https://adaptivegrc.com/pl/wszystkie-procesy-grc-w-jednym-narzedziu/","refsource":"cvd@cert.pl","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://cert.pl/posts/2026/04/CVE-2026-4313","name":"https://cert.pl/posts/2026/04/CVE-2026-4313","refsource":"cvd@cert.pl","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-4313","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4313","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"C&F","product":"AdaptiveGRC","version":"affected 5.420.00 5.420.66 custom","platforms":[]},{"source":"CNA","vendor":"C&F","product":"AdaptiveGRC","version":"affected 5.420.00 5.444.119 custom","platforms":[]},{"source":"CNA","vendor":"C&F","product":"AdaptiveGRC","version":"affected 5.420.00 5.448.116 custom","platforms":[]},{"source":"CNA","vendor":"C&F","product":"AdaptiveGRC","version":"affected 5.420.00 5.453.110 custom","platforms":[]},{"source":"CNA","vendor":"C&F","product":"AdaptiveGRC","version":"affected 5.420.00 5.454.64 custom","platforms":[]},{"source":"CNA","vendor":"C&F","product":"AdaptiveGRC","version":"affected 5.420.00 5.455.87 custom","platforms":[]},{"source":"CNA","vendor":"C&F","product":"AdaptiveGRC","version":"affected 5.420.00 5.456.60 custom","platforms":[]},{"source":"CNA","vendor":"C&F","product":"AdaptiveGRC","version":"affected 5.420.00 5.499.113 custom","platforms":[]},{"source":"CNA","vendor":"C&F","product":"AdaptiveGRC","version":"affected 5.420.00 5.420.14 custom","platforms":[]},{"source":"CNA","vendor":"C&F","product":"AdaptiveGRC","version":"affected 5.420.00 5.423.7 custom","platforms":[]},{"source":"CNA","vendor":"C&F","product":"AdaptiveGRC","version":"affected 5.420.00 5.444.20 custom","platforms":[]},{"source":"CNA","vendor":"C&F","product":"AdaptiveGRC","version":"affected 5.420.00 5.448.42 custom","platforms":[]},{"source":"CNA","vendor":"C&F","product":"AdaptiveGRC","version":"affected 5.420.00 5.449.40 custom","platforms":[]},{"source":"CNA","vendor":"C&F","product":"AdaptiveGRC","version":"affected 5.420.00 5.453.19 custom","platforms":[]},{"source":"CNA","vendor":"C&F","product":"AdaptiveGRC","version":"affected 5.420.00 5.454.17 custom","platforms":[]},{"source":"CNA","vendor":"C&F","product":"AdaptiveGRC","version":"affected 5.420.00 5.456.20 custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Antoni Kwietniewski (mBank)","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"4313","cve":"CVE-2026-4313","epss":"0.000250000","percentile":"0.069350000","score_date":"2026-04-25","updated_at":"2026-04-26 00:00:20"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-4313","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-04-24T12:01:03.434783Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-24T12:01:12.557Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"AdaptiveGRC","vendor":"C&F","versions":[{"lessThan":"5.420.66","status":"affected","version":"5.420.00","versionType":"custom"},{"lessThan":"5.444.119","status":"affected","version":"5.420.00","versionType":"custom"},{"lessThan":"5.448.116","status":"affected","version":"5.420.00","versionType":"custom"},{"lessThan":"5.453.110","status":"affected","version":"5.420.00","versionType":"custom"},{"lessThan":"5.454.64","status":"affected","version":"5.420.00","versionType":"custom"},{"lessThan":"5.455.87","status":"affected","version":"5.420.00","versionType":"custom"},{"lessThan":"5.456.60","status":"affected","version":"5.420.00","versionType":"custom"},{"lessThan":"5.499.113","status":"affected","version":"5.420.00","versionType":"custom"}]},{"defaultStatus":"unaffected","modules":["Angular"],"product":"AdaptiveGRC","vendor":"C&F","versions":[{"lessThan":"5.420.14","status":"affected","version":"5.420.00","versionType":"custom"},{"lessThan":"5.423.7","status":"affected","version":"5.420.00","versionType":"custom"},{"lessThan":"5.444.20","status":"affected","version":"5.420.00","versionType":"custom"},{"lessThan":"5.448.42","status":"affected","version":"5.420.00","versionType":"custom"},{"lessThan":"5.449.40","status":"affected","version":"5.420.00","versionType":"custom"},{"lessThan":"5.453.19","status":"affected","version":"5.420.00","versionType":"custom"},{"lessThan":"5.454.17","status":"affected","version":"5.420.00","versionType":"custom"},{"lessThan":"5.456.20","status":"affected","version":"5.420.00","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Antoni Kwietniewski (mBank)"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"AdaptiveGRC is vulnerable to Stored XSS via text type fields across the forms. Authenticated attacker can replace the value of the text field in the HTTP POST request. Improper parameter validation by the server results in&nbsp;arbitrary JavaScript execution in the victim's browser.<br><span style=\"background-color: rgb(255, 255, 255);\">Critically, this may&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">allow the attacker to obtain the administrator authentication token and</span>&nbsp;perform arbitrary actions with administrative privileges, which could lead to further compromise.</span><br><br>This issue occurs in versions released before December 2025."}],"value":"AdaptiveGRC is vulnerable to Stored XSS via text type fields across the forms. Authenticated attacker can replace the value of the text field in the HTTP POST request. Improper parameter validation by the server results in arbitrary JavaScript execution in the victim's browser.\nCritically, this may allow the attacker to obtain the administrator authentication token and perform arbitrary actions with administrative privileges, which could lead to further compromise.\n\nThis issue occurs in versions released before December 2025."}],"impacts":[{"capecId":"CAPEC-592","descriptions":[{"lang":"en","value":"CAPEC-592 Stored XSS"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"ADJACENT","baseScore":2.4,"baseSeverity":"LOW","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","userInteraction":"PASSIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-24T11:05:42.839Z","orgId":"4bb8329e-dd38-46c1-aafb-9bf32bcb93c6","shortName":"CERT-PL"},"references":[{"tags":["third-party-advisory"],"url":"https://cert.pl/posts/2026/04/CVE-2026-4313"},{"tags":["product"],"url":"https://adaptivegrc.com/pl/wszystkie-procesy-grc-w-jednym-narzedziu/"}],"source":{"discovery":"EXTERNAL"},"title":"Stored XSS in AdaptiveGRC","x_generator":{"engine":"Vulnogram 0.2.0"}}},"cveMetadata":{"assignerOrgId":"4bb8329e-dd38-46c1-aafb-9bf32bcb93c6","assignerShortName":"CERT-PL","cveId":"CVE-2026-4313","datePublished":"2026-04-24T11:05:42.839Z","dateReserved":"2026-03-17T07:07:58.093Z","dateUpdated":"2026-04-24T12:01:12.557Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-24 12:17:07","lastModifiedDate":"2026-04-24 14:39:28","problem_types":["CWE-79","CWE-79 CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')"],"metrics":{"cvssMetricV40":[{"source":"cvd@cert.pl","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":2.4,"baseSeverity":"LOW","attackVector":"ADJACENT","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"PASSIVE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"4313","Ordinal":"1","Title":"Stored XSS in AdaptiveGRC","CVE":"CVE-2026-4313","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"4313","Ordinal":"1","NoteData":"AdaptiveGRC is vulnerable to Stored XSS via text type fields across the forms. Authenticated attacker can replace the value of the text field in the HTTP POST request. Improper parameter validation by the server results in arbitrary JavaScript execution in the victim's browser.\nCritically, this may allow the attacker to obtain the administrator authentication token and perform arbitrary actions with administrative privileges, which could lead to further compromise.\n\nThis issue occurs in versions released before December 2025.","Type":"Description","Title":"Stored XSS in AdaptiveGRC"}]}}}