CVE-2026-40028

Hayabusa versions prior to 3.8.0 contain a cross-site scripting (XSS) vulnerability in its HTML report output that allows an attacker to execute arbitrary JavaScript when a user scans JSON-exported logs containing malicious content in the Computer field. An attacker can inject JavaScript into the Computer field of JSON logs that executes in the forensic examiner's browser session when viewing the generated HTML report, leading to information disclosure or code execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yamato-security:hayabusa:*:*:*:*:*:*:*:*

History

17 Apr 2026, 16:17

Type Values Removed Values Added
First Time Yamato-security hayabusa
Yamato-security
References () https://github.com/Yamato-Security/hayabusa/releases/tag/v3.8.0 - () https://github.com/Yamato-Security/hayabusa/releases/tag/v3.8.0 - Release Notes
References () https://mobasi.ai/sentinel - () https://mobasi.ai/sentinel - Third Party Advisory
References () https://www.vulncheck.com/advisories/hayabusa-xss-via-json-log-import - () https://www.vulncheck.com/advisories/hayabusa-xss-via-json-log-import - Third Party Advisory
CPE cpe:2.3:a:yamato-security:hayabusa:*:*:*:*:*:*:*:*

08 Apr 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-08 22:16

Updated : 2026-04-17 16:17


NVD link : CVE-2026-40028

Mitre link : CVE-2026-40028

CVE.ORG link : CVE-2026-40028


JSON object : View

Products Affected

yamato-security

  • hayabusa
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')