Vulnerability Description
LuCI is the OpenWrt Configuration Interface. Versions prior to both 24.10.5 and 25.12.0, contain a stored XSS vulnerability in the wireless scan modal, where SSID values from scan results are rendered as raw HTML without any sanitization. The wireless.js file in the luci-mod-network package passes SSIDs via a template literal to dom.append(), which processes them through innerHTML, allowing an attacker to craft a malicious SSID containing arbitrary HTML/JavaScript. Exploitation requires the user to actively open the wireless scan modal (e.g., to connect to a Wi-Fi access point or survey nearby channels), and only affects OpenWrt versions newer than 23.05/22.03 up to the patched releases (24.10.6 and 25.12.1). The issue has been fixed in version LuCI 26.072.65753~068150b.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openwrt | Luci | < 26.072.65753-068150b |
| Openwrt | Openwrt | < 24.10.6 |
Related Weaknesses (CWE)
References
- https://github.com/openwrt/luci/commit/068150ba5f524ef6b03817b258d31ec310053fd6Patch
- https://github.com/openwrt/luci/commit/cdce600aaec66f762f18d608c74cbf3abcafe1c7Patch
- https://github.com/openwrt/luci/security/advisories/GHSA-vvj6-7362-pjrwPatchVendor Advisory
FAQ
What is CVE-2026-32721?
CVE-2026-32721 is a vulnerability with a CVSS score of 8.6 (HIGH). LuCI is the OpenWrt Configuration Interface. Versions prior to both 24.10.5 and 25.12.0, contain a stored XSS vulnerability in the wireless scan modal, where SSID values from scan results are rendered...
How severe is CVE-2026-32721?
CVE-2026-32721 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32721?
Check the references section above for vendor advisories and patch information. Affected products include: Openwrt Luci, Openwrt Openwrt.