Metrics
Affected Vendors & Products
No advisories yet.
Solution
Users are strongly recommended to upgrade to the latest release of Incoming Goods Suite (>= 1.2.1).
Workaround
No workaround given by the vendor.
Thu, 15 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 15 Jan 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive. | |
| Weaknesses | CWE-601 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2026-01-15T14:28:17.199Z
Reserved: 2026-01-08T09:59:06.198Z
Link: CVE-2026-22638
Updated: 2026-01-15T14:28:13.303Z
Status : Received
Published: 2026-01-15T14:16:27.330
Modified: 2026-01-15T14:16:27.330
Link: CVE-2026-22638
No data.
OpenCVE Enrichment
No data.