CVE-2026-32289
mediumCVSS v3 Base Score
5.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
EPSS Score
0.0%
Exploitation probability in 30 days
Top 99% most likely to be exploited
Attack Characteristics
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Confidentiality
Low
Integrity
Low
Availability
None
Vulnerability Report
Generated by CyberWatcher
Description
A flaw was found in the `html/template` package. This vulnerability arises from improper tracking of context and brace depth within JavaScript (JS) template literals. A remote attacker could exploit these issues to cause content to be incorrectly or improperly escaped, leading to Cross-Site Scripting (XSS) vulnerabilities. This could allow an attacker to inject malicious scripts into web pages viewed by other users.
CWE
CWE-79Affected Products
Assisted Installer for Red Hat OpenShift Container Platform 2Builds for Red Hat OpenShiftcert-manager Operator for Red Hat OpenShiftCompliance OperatorConfidential Compute AttestationCryostat 4Custom Metric Autoscaler operator for Red Hat OpenshiftDeployment Validation OperatorExternalDNS OperatorExternal Secrets Operator for Red Hat OpenShift