Cyber Posture

CVE-2026-33080

High

Published: 20 March 2026

Published
20 March 2026
Modified
23 March 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
EPSS Score 0.0002 6.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33080 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Filamentphp Filament. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Browser Session Hijacking (T1185); ranked at the 6.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Browser Session Hijacking (T1185) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-15 requires filtering or escaping output prior to rendering, directly preventing the stored XSS by neutralizing malicious HTML/JS in Filament table summarizers.

prevent

SI-10 enforces input validation on data inserted into database columns, blocking malicious HTML/JS payloads before storage in vulnerable Filament summarizers.

prevent

SI-2 mandates timely flaw remediation, such as patching Filament to versions 4.8.5 or 5.3.5 that implement HTML escaping for the affected summarizers.

MITRE ATT&CK Enterprise TechniquesAI

T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
Why these techniques?

Stored XSS directly enables script injection in victim browsers for session hijacking (T1185) and cookie theft (T1539) leading to unauthorized actions as described.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Filament is a collection of full-stack components for accelerated Laravel development. Versions 4.0.0 through 4.8.4 and 5.0.0 through 5.3.4 have two Filament Table summarizers (Range, Values) that render raw database values without escaping HTML. If there is a lack of…

more

validation for the data in the columns that use these summarizers, an attacker could plant malicious HTML / JavaScript and achieve stored XSS that executes for users who view the table with those summarizers. This issue has been patched in versions 4.8.5 and 5.3.5.

Deeper analysisAI

CVE-2026-33080 is a stored cross-site scripting (XSS) vulnerability (CWE-79, CWE-80) in Filament, a collection of full-stack components for accelerated Laravel development. The issue affects the Range and Values table summarizers in versions 4.0.0 through 4.8.4 and 5.0.0 through 5.3.4, which render raw database values without escaping HTML. This flaw arises when there is insufficient validation of data in columns using these summarizers, allowing malicious HTML or JavaScript to be stored and rendered. The vulnerability has a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N).

An attacker with low privileges, such as an authenticated user able to insert data into affected table columns, can exploit this by planting malicious payloads in the database. When administrators or other users view the table with the vulnerable summarizers enabled, the payload executes in their browsers, leading to stored XSS. Successful exploitation enables high-impact confidentiality and integrity violations, such as session hijacking, data theft, or unauthorized actions on behalf of the victim, though it requires user interaction and does not affect availability.

The Filament security advisory (GHSA-vv3x-j2x5-36jc) and related GitHub references confirm the issue has been addressed in versions 4.8.5 and 5.3.5 via a specific commit (efa041aeeb4b1a99acd48aaa05584993c926d1ed) that implements proper HTML escaping. Security practitioners should upgrade to these patched versions immediately and review custom table implementations for adequate input validation on summarizer columns to mitigate risks in unpatched environments.

Details

CWE(s)

Affected Products

filamentphp
filament
4.0.0 — 4.8.5 · 5.0.0 — 5.3.5

CVEs Like This One

CVE-2025-67507Same product: Filamentphp Filament
CVE-2026-27070Shared CWE-79
CVE-2026-4108Shared CWE-79
CVE-2025-23429Shared CWE-79
CVE-2025-26585Shared CWE-79
CVE-2026-32277Shared CWE-79
CVE-2026-34560Shared CWE-79
CVE-2026-30919Shared CWE-79
CVE-2025-0475Shared CWE-79
CVE-2025-23845Shared CWE-79

References