{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T02:50:12.047","vulnerabilities":[{"cve":{"id":"CVE-2026-27169","sourceIdentifier":"security-advisories@github.com","published":"2026-02-21T00:16:16.810","lastModified":"2026-02-23T20:50:36.870","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Versions 1.1.2-alpha and below render untrusted user/model content in chat tool UI surfaces using unsafe HTML interpolation patterns, leading to XSS. Stored content can execute JavaScript when later viewed in authenticated sessions. An attacker who can influence stored study/quiz/flashcard content could trigger script execution in a victim’s browser, potentially performing actions as that user in the local app session. This issue has been fixed in version 1.1.3-alpha."},{"lang":"es","value":"OpenSift es una herramienta de estudio de IA que tamiza grandes conjuntos de datos utilizando búsqueda semántica e IA generativa. Las versiones 1.1.2-alpha e inferiores renderizan contenido no confiable de usuario/modelo en las superficies de la interfaz de usuario de la herramienta de chat utilizando patrones de interpolación HTML inseguros, lo que lleva a XSS. El contenido almacenado puede ejecutar JavaScript cuando se visualiza posteriormente en sesiones autenticadas. Un atacante que puede influir en el contenido almacenado de estudio/cuestionario/tarjetas didácticas podría desencadenar la ejecución de scripts en el navegador de una víctima, realizando potencialmente acciones como ese usuario en la sesión de la aplicación local. Este problema ha sido solucionado en la versión 1.1.3-alpha."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L","baseScore":8.9,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":2.3,"impactScore":6.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-79"},{"lang":"en","value":"CWE-116"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:opensift:opensift:*:*:*:*:*:python:*:*","versionEndExcluding":"1.1.3","matchCriteriaId":"319EE5EC-3784-4572-A7A3-DFE3BC789A64"}]}]}],"references":[{"url":"https://github.com/OpenSift/OpenSift/releases/tag/v1.1.3-alpha","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/OpenSift/OpenSift/security/advisories/GHSA-qrpx-7cmv-5gv5","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}