CVE-2026-1008
Published: 15 January 2026
Summary
CVE-2026-1008 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Altium Altium Live. Its CVSS base score is 7.6 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 3.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Penetration testing submits XSS payloads to web applications, detecting cross-site scripting flaws for subsequent remediation.
Validates web inputs to reject script-related content that could produce XSS.
Output validation against expected content can reject or sanitize script content in generated web pages, reducing XSS exploitability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stored XSS in public-facing web app directly enables client-side JS execution (T1059.007) via profile injection (T1190) and session cookie theft (T1539).
NVD Description
A stored cross-site scripting (XSS) vulnerability exists in the user profile text fields of Altium 365. Insufficient server-side input sanitization allows authenticated users to inject arbitrary HTML and JavaScript payloads using whitespace-based attribute parsing bypass techniques. The injected payload is…
more
persisted and executed when other users view the affected profile page, potentially allowing session token theft, phishing attacks, or malicious redirects. Exploitation requires an authenticated account and user interaction to view the crafted profile.
Deeper analysisAI
CVE-2026-1008 is a stored cross-site scripting (XSS) vulnerability, classified under CWE-79, affecting the user profile text fields in Altium 365. The issue arises from insufficient server-side input sanitization, which permits authenticated users to inject arbitrary HTML and JavaScript payloads by exploiting whitespace-based attribute parsing bypass techniques. Published on 2026-01-15, the vulnerability carries a CVSS v3.1 base score of 7.6 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N).
An authenticated attacker can exploit this vulnerability by injecting a malicious payload into their own profile text field, where it is persisted on the server. When other users view the attacker's profile page, the payload executes in their browsers, enabling potential session token theft, phishing attacks, or malicious redirects. Successful exploitation requires an authenticated account for the attacker and user interaction from victims to access the crafted profile.
Mitigation details are available in Altium's security advisory at https://www.altium.com/platform/security-compliance/security-advisories.
Details
- CWE(s)