<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Fides.js — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/fides.js/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 19:06:54 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/fides.js/feed.xml" rel="self" type="application/rss+xml"/><item><title>ethyca-fides fides.js DOM-based XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-ethyca-fides-xss/</link><pubDate>Thu, 14 May 2026 19:06:54 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-ethyca-fides-xss/</guid><description>A DOM-based XSS vulnerability (CVE-2026-44541) exists in ethyca-fides' fides.js script, allowing arbitrary JavaScript execution in the embedding site's origin via crafted links when HTML-formatted descriptions are enabled.</description><content:encoded><![CDATA[<p>A DOM-based XSS vulnerability has been identified in <code>fides.js</code>, the script used for rendering consent banners in Fides Enterprise deployments. The vulnerability (CVE-2026-44541) stems from a trust gap between the override mechanism, which allows banner fields like the description text to be modified via URL parameters, JavaScript globals, or cookies, and the HTML-formatted descriptions feature. When the <code>FIDES_PRIVACY_CENTER__ALLOW_HTML_DESCRIPTION</code> flag is enabled, the overridden description is rendered as live HTML without proper server-side sanitization, allowing attackers to inject arbitrary JavaScript code via a crafted link. This issue affects Fides Enterprise deployments using <code>fides.js</code> with HTML-formatted banner descriptions enabled. This allows attackers to execute arbitrary JavaScript code in the embedding site&rsquo;s origin. The vulnerability was patched in <code>ethyca/fides-privacy-center:2.84.5</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious URL containing JavaScript code within the <code>fides_description</code> parameter (e.g., <code>&lt;img src=x onerror=&quot;alert(\</code>DOM XSS in fides_description. Origin: ${document.domain}`)&quot;&gt;`).</li>
<li>The attacker distributes the malicious URL to potential victims through phishing or other social engineering techniques.</li>
<li>A victim clicks on the malicious URL, which loads the page where the consent banner is supposed to render.</li>
<li><code>fides.js</code> retrieves the malicious JavaScript code from the <code>fides_description</code> parameter in the URL.</li>
<li>Because HTML-formatted descriptions are enabled (<code>FIDES_PRIVACY_CENTER__ALLOW_HTML_DESCRIPTION=true</code>), <code>fides.js</code> renders the malicious JavaScript code as live HTML without sanitization.</li>
<li>The victim&rsquo;s browser executes the injected JavaScript code within the context of the embedding website&rsquo;s origin.</li>
<li>(Optional) The attacker can leverage the XSS vulnerability to set a <code>fides_description</code> cookie, which persists the payload across all subdomains until the cookie is cleared.</li>
<li>The attacker gains the ability to read and modify data, issue requests, and render malicious content that appears to come from the site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows the attacker to execute arbitrary JavaScript code within the embedding site&rsquo;s origin, granting them the same privileges as the site&rsquo;s own scripts. This could lead to the theft of sensitive user data, modification of website content, redirection of users to malicious sites, or execution of arbitrary actions on behalf of the user. The cookie-based persistence variant increases the impact, as a single click can result in a persistent payload affecting all subdomains until cookies are cleared. The severity is rated HIGH with a CVSS v4 score of 7.0.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>ethyca-fides</code> version 2.84.5 or later, or <code>fidesplus</code> version 2.84.6, which contain the patch for CVE-2026-44541.</li>
<li>As a workaround, set <code>FIDES_PRIVACY_CENTER__ALLOW_HTML_DESCRIPTION=false</code> on the Privacy Center container(s) to disable HTML-formatted descriptions, mitigating the XSS vulnerability.</li>
<li>Deploy the Sigma rule &ldquo;Detect ethyca-fides fides.js DOM-based XSS Attempt&rdquo; to identify potential exploitation attempts.</li>
<li>Monitor web server logs for requests containing the <code>fides_description</code> parameter with HTML tags or JavaScript code to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xss</category><category>dom-xss</category><category>ghsa</category><category>ethyca-fides</category></item></channel></rss>