CVE-2026-31381

An attacker can extract user email addresses (PII) exposed in base64 encoding via the state parameter in the OAuth callback URL.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gainsight:assist:-:*:*:*:*:*:*:*

History

16 Apr 2026, 15:16

Type Values Removed Values Added
CWE NVD-CWE-noinfo
Summary
  • (es) Un atacante puede extraer direcciones de correo electrónico de usuario (IIP) expuestas en codificación base64 a través del parámetro state en la URL de devolución de llamada de OAuth.
CPE cpe:2.3:a:gainsight:assist:-:*:*:*:*:*:*:*
References () http://www.rapid7.com/blog/post/ve-cve-2026-31381-cve-2026-31382-gainsight-assist-information-disclosure-xss-fixed - () http://www.rapid7.com/blog/post/ve-cve-2026-31381-cve-2026-31382-gainsight-assist-information-disclosure-xss-fixed - Third Party Advisory
References () https://communities.gainsight.com/community-news-2/recent-gainsight-assist-plugin-remediations-cve-2026-31381-and-cve-2026-31382-30587 - () https://communities.gainsight.com/community-news-2/recent-gainsight-assist-plugin-remediations-cve-2026-31381-and-cve-2026-31382-30587 - Vendor Advisory
First Time Gainsight
Gainsight assist

23 Mar 2026, 11:16

Type Values Removed Values Added
References
  • () https://communities.gainsight.com/community-news-2/recent-gainsight-assist-plugin-remediations-cve-2026-31381-and-cve-2026-31382-30587 -

20 Mar 2026, 14:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-20 14:16

Updated : 2026-04-16 15:16


NVD link : CVE-2026-31381

Mitre link : CVE-2026-31381

CVE.ORG link : CVE-2026-31381


JSON object : View

Products Affected

gainsight

  • assist
CWE
CWE-598

Use of GET Request Method With Sensitive Query Strings

NVD-CWE-noinfo