Vulnerability Description
Hayabusa versions prior to 3.8.0 contain a cross-site scripting (XSS) vulnerability in its HTML report output that allows an attacker to execute arbitrary JavaScript when a user scans JSON-exported logs containing malicious content in the Computer field. An attacker can inject JavaScript into the Computer field of JSON logs that executes in the forensic examiner's browser session when viewing the generated HTML report, leading to information disclosure or code execution.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Yamato-Security | Hayabusa | < 3.8.0 |
Related Weaknesses (CWE)
References
- https://github.com/Yamato-Security/hayabusa/releases/tag/v3.8.0Release Notes
- https://mobasi.ai/sentinelThird Party Advisory
- https://www.vulncheck.com/advisories/hayabusa-xss-via-json-log-importThird Party Advisory
FAQ
What is CVE-2026-40028?
CVE-2026-40028 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Hayabusa versions prior to 3.8.0 contain a cross-site scripting (XSS) vulnerability in its HTML report output that allows an attacker to execute arbitrary JavaScript when a user scans JSON-exported lo...
How severe is CVE-2026-40028?
CVE-2026-40028 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-40028?
Check the references section above for vendor advisories and patch information. Affected products include: Yamato-Security Hayabusa.