CoolerControl UI XSS (CVE-2026-5301)
CVE-2026-5301
Stored XSS in log viewer in CoolerControl/coolercontrol-ui <4.0.0 allows unauthenticated attackers to take over the service via malicious JavaScript in poisoned log entries...
Overview
A stored cross-site scripting (XSS) vulnerability, identified as CVE-2026-5301, exists in the log viewer component of CoolerControl/coolercontrol-ui versions prior to 4.0.0. This flaw allows an unauthenticated remote attacker to inject and persistently store malicious JavaScript code within log entries. When an administrator or other user views these poisoned logs in the web interface, the attacker’s script executes in the victim’s browser session.
Technical Impact
The vulnerability has a CVSS v3.1 base score of 7.6 (High). With no privileges required and low attack complexity, an attacker can craft a malicious log entry-potentially by sending malformed data to a service that CoolerControl monitors-to poison the log viewer. Successful exploitation requires user interaction, typically an administrator reviewing logs. Once executed, the malicious script runs within the context of the CoolerControl UI session. This can lead to a complete compromise of the CoolerControl service, allowing attackers to perform actions as the logged-in user, such as changing system settings, executing commands on the underlying host, or stealing session credentials. For the latest on emerging threats, monitor our security news.
Affected Products
This vulnerability affects CoolerControl/coolercontrol-ui versions less than 4.0.0. The coolercontrol-ui is the web-based management interface for the CoolerControl hardware monitoring and fan control software.
Remediation and Mitigation
The primary and definitive remediation is to upgrade to CoolerControl/coolercontrol-ui version 4.0.0 or later. The maintainers have addressed the vulnerability in this release.
If immediate upgrading is not possible, consider these temporary mitigation strategies:
- Restrict Network Access: Ensure the CoolerControl UI web interface is not exposed to untrusted networks, such as the public internet. Limit access to trusted internal IP ranges only.
- Implement a Web Application Firewall (WAF): Deploy a WAF in front of the service configured to filter and block XSS payloads.
- Administrative Awareness: Advise users with access to the log viewer to exercise caution and avoid interacting with suspicious or unexpected log entries.
Organizations should review access logs for any unusual activity targeting the /logs or similar endpoints. For guidance on handling potential compromises, relevant breach reports may provide useful context.
Security Insight
This vulnerability highlights the persistent risk of secondary data channels, like log files, becoming attack vectors when they are not properly sanitized before display. It mirrors incidents in other management consoles where trusted administrative data feeds became injection points. The flaw suggests a need for stronger input validation and output encoding practices across all data presentation layers in system management tools, not just primary user inputs.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
Postiz is an AI social media scheduling tool. Prior to version 2.21.6, a file upload validation bypass allows any authenticated user to upload arbitrary HTML, SVG, or other executable file types to th...
A Stored Cross-Site Scripting vulnerability was discovered in the Assets and Nodes functionality due to improper validation of an input parameter. An authenticated user with custom fields privileges c...
A Cross-site Scripting (XSS) vulnerability was identified in the `from_dict` method of the `AppLollmsMessage` class in parisneo/lollms prior to version 2.2.0. The vulnerability arises from the lack of...
MyBB Downloads Plugin 2.0.3 contains a persistent cross-site scripting vulnerability that allows regular members to inject malicious scripts through the download title field. Attackers can submit a ne...