Permalink
CVE-2026-40028
5.4 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): REQUIRED
- Scope (S): CHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): NONE
Hayabusa < 3.8.0 XSS via JSON Log Import
Hayabusa versions prior to 3.8.0 contain a cross-site scripting (XSS) vulnerability in its HTML report output that allows an attacker to execute arbitrary JavaScript when a user scans JSON-exported logs containing malicious content in the Computer field. An attacker can inject JavaScript into the Computer field of JSON logs that executes in the forensic examiner's browser session when viewing the generated HTML report, leading to information disclosure or code execution.
References
-
Release Notes product
-
Mobasi Sentinel Vulnerability Index vendor-advisory
-
VulnCheck Advisory: Hayabusa < 3.8.0 XSS via JSON Log Import third-party-advisory
Affected products
hayabusa
- ==3.8.0
- =<3.7.0
Matching in nixpkgs
pkgs.hayabusa
Swift rust fetch program
pkgs.hayabusa-sec
Sigma-based threat hunting and fast forensics timeline generator for Windows event logs
-
nixos-unstable 3.7.0-unstable-2025-12-02
- nixpkgs-unstable 3.7.0-unstable-2025-12-02
- nixos-unstable-small 3.7.0-unstable-2025-12-02
-
nixos-25.11 3.7.0-unstable-2025-12-02
- nixos-25.11-small 3.7.0-unstable-2025-12-02
- nixpkgs-25.11-darwin 3.7.0-unstable-2025-12-02
Package maintainers
-
@D3vil0p3r Antonio Voza <vozaanthony@gmail.com>
-
@06kellyjac Jack <hello+nixpkgs@j-k.io>