<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-5301 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5301/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 08 Apr 2026 13:16:43 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5301/feed.xml" rel="self" type="application/rss+xml"/><item><title>CoolerControl-UI Stored XSS Vulnerability (CVE-2026-5301)</title><link>https://feed.craftedsignal.io/briefs/2026-04-coolercontrol-xss/</link><pubDate>Wed, 08 Apr 2026 13:16:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-coolercontrol-xss/</guid><description>Unauthenticated attackers can perform a stored XSS attack against CoolerControl/coolercontrol-ui versions less than 4.0.0 by injecting malicious JavaScript into log entries, leading to potential service takeover.</description><content:encoded><![CDATA[<p>CoolerControl/coolercontrol-ui versions prior to 4.0.0 are vulnerable to a stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2026-5301. This flaw resides in the log viewer component of the application. Unauthenticated attackers can exploit this vulnerability by injecting malicious JavaScript code into log entries. When a user views the log entries containing the malicious script, the script executes within their browser, potentially allowing the attacker to take over the CoolerControl service. The vulnerability was reported by GitLab Inc. and affects versions prior to the release of version 4.0.0. This is a high severity vulnerability because it allows unauthenticated attackers to perform actions as other users in the application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a CoolerControl/coolercontrol-ui instance running a version prior to 4.0.0.</li>
<li>The attacker crafts a malicious log entry containing JavaScript code designed to execute arbitrary actions within a user&rsquo;s session, such as stealing cookies or redirecting to a phishing site.</li>
<li>The attacker injects this malicious log entry into the CoolerControl/coolercontrol-ui system. The method of injection is not specified in the source but could involve exploiting other vulnerabilities or misconfigurations in the system.</li>
<li>A user, such as an administrator, accesses the log viewer within the CoolerControl/coolercontrol-ui interface.</li>
<li>The log viewer renders the malicious log entry, causing the injected JavaScript code to execute in the user&rsquo;s browser.</li>
<li>The attacker gains control of the user&rsquo;s session or performs other malicious actions, such as stealing credentials or injecting further malicious content into the application.</li>
<li>The attacker uses the compromised session to potentially escalate privileges and gain complete control over the CoolerControl service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5301 can lead to a complete compromise of the CoolerControl service. An attacker could gain unauthorized access to sensitive data, modify system configurations, or use the compromised system as a launchpad for further attacks. Given the nature of XSS vulnerabilities, impact is highly dependent on the privileges of the user whose session is compromised.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade CoolerControl/coolercontrol-ui to version 4.0.0 or later to remediate CVE-2026-5301.</li>
<li>Implement input validation and output encoding on all log entries to prevent the injection of malicious scripts.</li>
<li>Deploy the Sigma rule provided below to detect potential exploitation attempts by monitoring for script execution in the context of the CoolerControl/coolercontrol-ui web application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xss</category><category>cve-2026-5301</category><category>web-application</category></item></channel></rss>