Description
OMERO.web provides a web based client and plugin infrastructure. There is currently no escaping or validation of the `callback` parameter that can be passed to various OMERO.web endpoints that have JSONP enabled. This vulnerability has been patched in version 5.26.0.
References (2)
Core 2
Core References
Vendor Advisory x_refsource_confirm
https://github.com/ome/omero-web/security/advisories/GHSA-vr85-5pwx-c6gq
Patch x_refsource_misc
https://github.com/ome/omero-web/commit/d41207cbb82afc56ea79e84db532608aa24ab4aa
Scores
CVSS v3
6.1
EPSS
0.0042
EPSS Percentile
62.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-830
Status
published
Products (2)
openmicroscopy/omero-web
< 5.26.0
pypi/omero-web
0 - 5.26.0PyPI
Published
May 21, 2024
Tracked Since
Feb 18, 2026