Hayabusa versions prior to 3.8.0 contain a cross-site scripting (XSS) vulnerability in its HTML report output that allows an attacker to execute arbitrary JavaScript when a user scans JSON-exported logs containing malicious content in the Computer field. An attacker can inject JavaScript into the Computer field of JSON logs that executes in the forensic examiner's browser session when viewing the generated HTML report, leading to information disclosure or code execution.
References
| Link | Resource |
|---|---|
| https://github.com/Yamato-Security/hayabusa/releases/tag/v3.8.0 | Release Notes |
| https://mobasi.ai/sentinel | Third Party Advisory |
| https://www.vulncheck.com/advisories/hayabusa-xss-via-json-log-import | Third Party Advisory |
Configurations
History
17 Apr 2026, 16:17
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Yamato-security hayabusa
Yamato-security |
|
| References | () https://github.com/Yamato-Security/hayabusa/releases/tag/v3.8.0 - Release Notes | |
| References | () https://mobasi.ai/sentinel - Third Party Advisory | |
| References | () https://www.vulncheck.com/advisories/hayabusa-xss-via-json-log-import - Third Party Advisory | |
| CPE | cpe:2.3:a:yamato-security:hayabusa:*:*:*:*:*:*:*:* |
08 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-08 22:16
Updated : 2026-04-17 16:17
NVD link : CVE-2026-40028
Mitre link : CVE-2026-40028
CVE.ORG link : CVE-2026-40028
JSON object : View
Products Affected
yamato-security
- hayabusa
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
