Cyber Posture

CVE-2026-26723

HighPublic PoC

Published: 20 February 2026

Published
20 February 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
EPSS Score 0.0011 28.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26723 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Keystorage Global Facilities Management Software. Its CVSS base score is 8.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Validates the function parameter input to reject or sanitize malicious scripts, directly preventing XSS exploitation in the Global Facilities Management Software.

prevent

Filters and encodes information output to web pages, blocking execution of injected scripts in victims' browsers and addressing the reflected XSS via function parameter.

preventrecover

Identifies, prioritizes, and remediates the specific XSS flaw in version 20230721a through patching or updates, eliminating the vulnerability at its root.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
Why these techniques?

XSS vulnerability in public-facing software enables remote exploitation without authentication (T1190) and allows arbitrary code execution in browser context to steal session cookies and sensitive data (T1539).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Management Software v. 20230721a allows a remote attacker to execute arbitrary code via the function parameter.

Deeper analysisAI

CVE-2026-26723 is a Cross-Site Scripting (XSS) vulnerability, classified under CWE-79, in Key Systems Inc Global Facilities Management Software version 20230721a. Published on 2026-02-20, it enables a remote attacker to execute arbitrary code through the function parameter. The vulnerability carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N), indicating high severity due to network accessibility, low attack complexity, no required privileges, user interaction dependency, changed scope, high confidentiality impact, low integrity impact, and no availability impact.

A remote attacker can exploit this vulnerability without authentication by crafting malicious input targeting the function parameter, typically delivered via a phishing link or malicious webpage that requires user interaction, such as clicking or viewing content. Successful exploitation executes arbitrary code in the victim's browser context, potentially leading to theft of sensitive session data, cookies, or other confidential information hosted by the application, as reflected in the high confidentiality impact and scope change.

The primary reference for this vulnerability is a GitHub repository containing vulnerability disclosures at https://github.com/chndlrx/vulnerability-disclosures/tree/main/CVE-2026-26723, which may provide additional details on exploitation or remediation steps.

Details

CWE(s)

Affected Products

keystorage
global facilities management software
20230721a

CVEs Like This One

CVE-2026-26724Same product: Keystorage Global Facilities Management Software
CVE-2026-26722Same product: Keystorage Global Facilities Management Software
CVE-2026-26721Same product: Keystorage Global Facilities Management Software
CVE-2024-57686Shared CWE-79
CVE-2025-22775Shared CWE-79
CVE-2025-23960Shared CWE-79
CVE-2024-40748Shared CWE-79
CVE-2025-64538Shared CWE-79
CVE-2024-57030Shared CWE-79
CVE-2026-34559Shared CWE-79

References