CVE-2026-42224: ipl/web XSS Vulnerability Impacts Icinga Web

CVE-2026-42224: ipl/web XSS Vulnerability Impacts Icinga Web

A high-severity Cross-Site Scripting (XSS) vulnerability, tracked as CVE-2026-42224, has been identified in ipl/web, a set of common web components used in PHP projects. The National Vulnerability Database reports this flaw, present in versions prior to 0.13.1, allows attackers to inject malicious JavaScript into a victim’s browser. This script then executes within the context of Icinga Web.

The attack scenario requires a victim to visit a specially crafted website. The National Vulnerability Database notes that victims may not immediately detect the compromise. Given the ipl/web components are foundational for PHP projects, this vulnerability carries a CVSS score of 7.6 (High) due to the potential for significant impact on confidentiality, integrity, and availability, as indicated by its vector CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H.

This XSS vulnerability, categorized as CWE-79, underscores the persistent risk of client-side injection flaws. Defenders must prioritize patching. The issue has been addressed in version 0.13.1 of ipl/web. Organizations leveraging Icinga Web or other PHP projects dependent on ipl/web must update immediately to mitigate this threat.

What This Means For You

  • If your organization uses Icinga Web or any PHP project relying on `ipl/web` components, you are exposed to CVE-2026-42224. An attacker can execute code in your users' browsers. Patch `ipl/web` to version 0.13.1 immediately to prevent XSS attacks and audit for any suspicious web traffic or user activity originating from Icinga Web instances.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

CVE-2026-42224: ipl/web XSS - Suspicious URI Query

Sigma YAML — free preview
title: CVE-2026-42224: ipl/web XSS - Suspicious URI Query
id: scw-2026-05-08-ai-1
status: experimental
level: high
description: |
  Detects attempts to exploit CVE-2026-42224 by looking for common XSS payload patterns within the URI query string of web requests targeting ipl/web components. This indicates an attacker trying to inject malicious JavaScript into the Icinga Web application.
author: SCW Feed Engine (AI-generated)
date: 2026-05-08
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-42224/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri-query|contains:
          - 'script%3C/script%3E'
          - 'alert(document.domain)'
          - 'onerror=alert'
      condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-42224 XSS ipl/web component in php projects
CVE-2026-42224 XSS ipl/web versions prior to 0.13.1
CVE-2026-42224 XSS Malicious Javascript injection in Icinga Web context
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 09, 2026 at 02:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-6667 — PgBouncer before 1.25.2 did not perform an appropriate

CVE-2026-6667 — PgBouncer before 1.25.2 did not perform an appropriate authorization check for the KILL_CLIENT admin command. All users with access to the administration console...

vulnerabilityCVEmedium-severitycwe-862
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 2 IOCs /⚙ 2 Sigma

CVE-2026-6666 — A possible null pointer reference in PgBouncer before

CVE-2026-6666 — A possible null pointer reference in PgBouncer before 1.25.2 could lead to a crash, if a server sends an error response without SQLSTATE...

vulnerabilityCVEmedium-severitycwe-476
/SCW Vulnerability Desk /MEDIUM /5.9 /⚑ 2 IOCs /⚙ 1 Sigma

PgBouncer SCRAM Vulnerability (CVE-2026-6665) Allows Stack Overflow

CVE-2026-6665 — The SCRAM code in PgBouncer before 1.25.2 did not check the return value of strlcat() correctly when building the contents of the SCRAM...

vulnerabilityCVEhigh-severitycwe-121
/SCW Vulnerability Desk /HIGH /8.1 /⚑ 4 IOCs /⚙ 2 Sigma