oRPC is an tool that helps build APIs that are end-to-end type-safe and adhere to OpenAPI standards. Prior to version 1.13.9, a stored cross-site scripting (XSS) vulnerability exists in the OpenAPI documentation generation of orpc. If an attacker can control any field within the OpenAPI specification (such as info.description), they can break out of the JSON context and execute arbitrary JavaScript when a user views the generated API documentation. This issue has been patched in version 1.13.9.
References
| Link | Resource |
|---|---|
| https://github.com/middleapi/orpc/commit/4f0efa8a1d3fa8e8317a4b03cc3945a5dfd68add | Patch |
| https://github.com/middleapi/orpc/releases/tag/v1.13.9 | Product Release Notes |
| https://github.com/middleapi/orpc/security/advisories/GHSA-7f6v-3gx7-27q8 | Exploit Mitigation Vendor Advisory |
| https://github.com/middleapi/orpc/security/advisories/GHSA-7f6v-3gx7-27q8 | Exploit Mitigation Vendor Advisory |
Configurations
History
26 Mar 2026, 13:26
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Orpc
Orpc orpc |
|
| CPE | cpe:2.3:a:orpc:orpc:*:*:*:*:*:*:*:* | |
| References | () https://github.com/middleapi/orpc/commit/4f0efa8a1d3fa8e8317a4b03cc3945a5dfd68add - Patch | |
| References | () https://github.com/middleapi/orpc/releases/tag/v1.13.9 - Product, Release Notes | |
| References | () https://github.com/middleapi/orpc/security/advisories/GHSA-7f6v-3gx7-27q8 - Exploit, Mitigation, Vendor Advisory |
25 Mar 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/middleapi/orpc/security/advisories/GHSA-7f6v-3gx7-27q8 - |
24 Mar 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-24 20:16
Updated : 2026-03-26 13:26
NVD link : CVE-2026-33331
Mitre link : CVE-2026-33331
CVE.ORG link : CVE-2026-33331
JSON object : View
Products Affected
orpc
- orpc
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
