CVE-2026-2101
Published: 16 February 2026
Summary
CVE-2026-2101 is a high-severity Cross-site Scripting (CWE-79) vulnerability in 3Ds (inferred from references). Its CVSS base score is 8.7 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Filters malicious scripts from web application outputs before delivery to the browser, directly preventing reflected XSS execution in user sessions.
Validates and sanitizes untrusted inputs to block injection of arbitrary scripts that could be reflected back to victims.
Remediates the specific reflected XSS flaw in ENOVIAvpm Web Access versions 1 R16-R19 by applying vendor-provided patches.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Reflected XSS in public-facing web app directly enables exploitation of the application (T1190) and arbitrary JavaScript execution in the victim browser (T1059.007).
NVD Description
A Reflected Cross-site Scripting (XSS) vulnerability affecting ENOVIAvpm Web Access from ENOVIAvpm Version 1 Release 16 through ENOVIAvpm Version 1 Release 19 allows an attacker to execute arbitrary script code in user's browser session.
Deeper analysisAI
CVE-2026-2101 is a Reflected Cross-site Scripting (XSS) vulnerability, mapped to CWE-79, affecting ENOVIAvpm Web Access in ENOVIAvpm Version 1 Release 16 through Version 1 Release 19. Published on 2026-02-16, it carries a CVSS v3.1 base score of 8.7 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N). The issue enables an attacker to execute arbitrary script code within a user's browser session.
Exploitation requires an attacker with low privileges (PR:L) to deliver a malicious payload over the network (AV:N) with low attack complexity (AC:L), typically by tricking a targeted user into some interaction (UI:R), such as clicking a crafted link. Upon success, the attacker achieves script execution in the victim's browser context, resulting in high confidentiality and integrity impacts (C:H/I:H) with no availability impact (A:N) and a changed scope (S:C) that could affect other users or resources.
Mitigation details are available in the vendor security advisory at https://www.3ds.com/trust-center/security/security-advisories/cve-2026-2101.
Details
- CWE(s)