CVE-2026-26724
Published: 20 February 2026
Summary
CVE-2026-26724 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Keystorage Global Facilities Management Software. Its CVSS base score is 7.6 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 24.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Penetration testing submits XSS payloads to web applications, detecting cross-site scripting flaws for subsequent remediation.
Validates web inputs to reject script-related content that could produce XSS.
Output validation against expected content can reject or sanitize script content in generated web pages, reducing XSS exploitability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
XSS in public-facing web app directly enables remote exploitation (T1190) and arbitrary JavaScript execution in victim browser (T1059.007).
NVD Description
Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Management Software v. 20230721a allows a remote attacker to execute arbitrary code via the selectgroup and gn parameters on the /?Function=Groups endpoint.
Deeper analysisAI
CVE-2026-26724 is a Cross-Site Scripting (XSS) vulnerability, classified under CWE-79, affecting Key Systems Inc Global Facilities Management Software version 20230721a. The flaw enables a remote attacker to execute arbitrary code through the selectgroup and gn parameters on the /?Function=Groups endpoint. It carries a CVSS v3.1 base score of 7.6, reflecting network accessibility, low attack complexity, requirement for low privileges and user interaction, changed scope, high confidentiality impact, low integrity impact, and no availability impact.
An attacker with low privileges (PR:L) can exploit this vulnerability remotely over the network by crafting malicious inputs for the vulnerable parameters and inducing a targeted user to interact with them, such as by clicking a link or submitting a form (UI:R). Successful exploitation allows execution of arbitrary code in the victim's browser context, potentially compromising sensitive data due to the high confidentiality impact and scope change.
Mitigation details are available in the vulnerability disclosure at https://github.com/chndlrx/vulnerability-disclosures/tree/main/CVE-2026-26724, published on 2026-02-20.
Details
- CWE(s)