CVE-2026-40302

zrok is software for sharing web services, files, and network resources. Prior to version 2.0.1, the proxyUi template engine uses Go's text/template (which performs no HTML escaping) instead of html/template. The GitHub OAuth callback handlers in both publicProxy and dynamicProxy embed the attacker-controlled refreshInterval query parameter verbatim into an error message when time.ParseDuration fails, and render that error unescaped into HTML. An attacker can deliver a crafted login URL to a victim; after the victim completes the GitHub OAuth flow, the callback page executes arbitrary JavaScript in the OAuth server's origin. Version 2.0.1 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:netfoundry:zrok:*:*:*:*:*:*:*:*

History

23 Apr 2026, 18:32

Type Values Removed Values Added
First Time Netfoundry
Netfoundry zrok
References () https://github.com/openziti/zrok/releases/tag/v2.0.1 - () https://github.com/openziti/zrok/releases/tag/v2.0.1 - Release Notes
References () https://github.com/openziti/zrok/security/advisories/GHSA-4fxq-2x3x-6xqx - () https://github.com/openziti/zrok/security/advisories/GHSA-4fxq-2x3x-6xqx - Vendor Advisory
CPE cpe:2.3:a:netfoundry:zrok:*:*:*:*:*:*:*:*

17 Apr 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-17 21:16

Updated : 2026-04-23 18:32


NVD link : CVE-2026-40302

Mitre link : CVE-2026-40302

CVE.ORG link : CVE-2026-40302


JSON object : View

Products Affected

netfoundry

  • zrok
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-116

Improper Encoding or Escaping of Output