<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Immich — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/immich/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 08 Apr 2026 19:25:24 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/immich/feed.xml" rel="self" type="application/rss+xml"/><item><title>Immich Stored XSS Vulnerability in 360° Panorama Viewer (CVE-2026-35455)</title><link>https://feed.craftedsignal.io/briefs/2024-01-immich-xss/</link><pubDate>Wed, 08 Apr 2026 19:25:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-immich-xss/</guid><description>A stored cross-site scripting (XSS) vulnerability in Immich versions before 2.7.0 allows authenticated users to inject arbitrary JavaScript via crafted equirectangular images, leading to session hijacking, data exfiltration, and unauthorized access.</description><content:encoded><![CDATA[<p>Immich, a self-hosted photo and video management solution, is vulnerable to a stored Cross-Site Scripting (XSS) attack.  Specifically, versions prior to 2.7.0 are susceptible. An authenticated attacker can exploit the 360° panorama viewer by uploading a specially crafted equirectangular image that contains malicious text. When another user views the panorama with the OCR overlay enabled, the injected text is extracted via OCR and rendered by the panorama viewer without sanitization. This leads to arbitrary JavaScript execution within the victim&rsquo;s browser. The vulnerability, identified as CVE-2026-35455, poses a significant risk, potentially leading to session hijacking (via persistent API key creation), private photo exfiltration, and unauthorized access to sensitive data like GPS location history and face biometric data. Users are advised to upgrade to version 2.7.0 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to an Immich instance with a valid user account.</li>
<li>The attacker crafts an equirectangular image containing malicious JavaScript code embedded within the text.</li>
<li>The attacker uploads the crafted image to the Immich server through the web interface.</li>
<li>The attacker shares or otherwise causes another user to view the uploaded panorama image.</li>
<li>The victim views the panorama image with the OCR overlay feature enabled.</li>
<li>The Immich server processes the image, and the OCR engine extracts the malicious JavaScript from the image.</li>
<li>The panorama viewer renders the OCR output via <code>innerHTML</code> without proper sanitization.</li>
<li>The malicious JavaScript executes within the victim&rsquo;s browser session, allowing the attacker to perform actions such as session hijacking, data exfiltration, or unauthorized data access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XSS vulnerability (CVE-2026-35455) in Immich can lead to severe consequences. An attacker can hijack user sessions by creating persistent API keys, allowing them to impersonate the victim. Furthermore, they can exfiltrate private photos and gain unauthorized access to sensitive information such as GPS location history and face biometric data stored within the Immich instance. The number of potential victims corresponds to the number of users on a vulnerable Immich instance. Given the self-hosted nature of Immich, the impact is largely dependent on the type and sensitivity of data stored within affected deployments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Immich to version 2.7.0 or later to patch the CVE-2026-35455 vulnerability.</li>
<li>Implement input validation and sanitization for user-uploaded content, particularly images, to prevent XSS attacks. Focus on <code>webserver</code> logs for unusual POST requests.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Immich Panorama Requests</code> to identify potential exploitation attempts based on unusual URL parameters indicative of crafted panorama requests.</li>
<li>Monitor <code>webserver</code> logs for HTTP requests containing suspicious JavaScript payloads within the URL, which may indicate XSS attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>immich</category><category>xss</category><category>cve-2026-35455</category><category>webserver</category></item></channel></rss>