A stored cross-site scripting (XSS) vulnerability exists in the user profile text fields of Altium 365. Insufficient server-side input sanitization allows authenticated users to inject arbitrary HTML and JavaScript payloads using whitespace-based attribute parsing bypass techniques.
The injected payload is persisted and executed when other users view the affected profile page, potentially allowing session token theft, phishing attacks, or malicious redirects. Exploitation requires an authenticated account and user interaction to view the crafted profile.
References
| Link | Resource |
|---|---|
| https://www.altium.com/platform/security-compliance/security-advisories | Vendor Advisory |
Configurations
History
23 Jan 2026, 19:34
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.altium.com/platform/security-compliance/security-advisories - Vendor Advisory | |
| CPE | cpe:2.3:a:altium:altium_live:1.2.2:*:*:*:*:*:*:* | |
| First Time |
Altium
Altium altium Live |
16 Jan 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.6 |
15 Jan 2026, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-15 23:15
Updated : 2026-01-23 19:34
NVD link : CVE-2026-1008
Mitre link : CVE-2026-1008
CVE.ORG link : CVE-2026-1008
JSON object : View
Products Affected
altium
- altium_live
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
