Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @orpc/openapi
  4. ›
  5. CVE-2026-33331

CVE-2026-33331: oRPC has Stored XSS in OpenAPI Reference Plugin via unescaped JSON.stringify

March 20, 2026

A Stored Cross-Site Scripting (XSS) vulnerability exists in the OpenAPI documentation generation of orpc. If an attacker can control any field within the OpenAPI specification (such as info.description), they can break out of the JSON context and execute arbitrary JavaScript when a user views the generated API documentation. In the packages/openapi/src/plugins/openapi-reference.ts file, the renderDocsHtml() function takes an OpenAPI spec object and embeds it directly into the HTML response using a template literal:

<script id="spec" type="application/json">${JSON.stringify(spec)}</script>

The JSON.stringify() function does not escape HTML characters like < or >. Therefore, if an attacker provides a string containing …, the browser will prematurely close the application/json script block and execute the subsequent malicious script block.

Proof of Concept (PoC)

  1. Create an API router with orpc and configure the OpenAPI plugin.
  2. In the API specification, inject a malicious payload into a field like description:
{
info: {
title: "My API",
version: "1.0.0",
description: "</script><script>alert('XSS executed on ' + document.domain)</script>"
}
}
  1. Generate and serve the documentation HTML.
  2. When a developer or user navigates to the API documentation URL, the browser parses the HTML, breaks out of the JSON block, and immediately executes the alert() payload.

Impact

If an application generates its OpenAPI specifications dynamically based on user-controlled inputs (or if a rogue developer modifies the spec), it leads to Stored XSS. When an administrator or developer views the API docs, the script executes in their browser, potentially leading to session hijacking or unauthorized API calls on their behalf.

Remediation

Do not use raw JSON.stringify() to embed data directly into HTML templates. Instead, safely serialize the JSON by escaping HTML-sensitive characters (like < and >) or use a secure HTML serialization library (such as serialize-javascript or devalue) before embedding it into the tag.

Disclosure & Credits

If this report is helpful, I kindly request that you publish this as a formal GitHub Security Advisory and assign me credit for the discovery. Thank you for maintaining this project!

References

  • github.com/advisories/GHSA-7f6v-3gx7-27q8
  • github.com/middleapi/orpc
  • github.com/middleapi/orpc/security/advisories/GHSA-7f6v-3gx7-27q8
  • nvd.nist.gov/vuln/detail/CVE-2026-33331

Code Behaviors & Features

Detect and mitigate CVE-2026-33331 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.13.9

Fixed versions

  • 1.13.9

Solution

Upgrade to version 1.13.9 or above.

Impact 8.2 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

npm/@orpc/openapi/CVE-2026-33331.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 21 Mar 2026 12:17:37 +0000.