oRPC is an tool that helps build APIs that are end-to-end type-safe and adhere to OpenAPI standards. Prior to version 1.13.9, a stored cross-site scripting (XSS) vulnerability exists in the OpenAPI documentation generation of orpc. If an attacker can control any field within the OpenAPI specification (such as info.description), they can break out of the JSON context and execute arbitrary JavaScript when a user views the generated API documentation. This issue has been patched in version 1.13.9.
References
| Link | Resource |
|---|---|
| https://github.com/middleapi/orpc/commit/4f0efa8a1d3fa8e8317a4b03cc3945a5dfd68add | Patch |
| https://github.com/middleapi/orpc/releases/tag/v1.13.9 | Product Release Notes |
| https://github.com/middleapi/orpc/security/advisories/GHSA-7f6v-3gx7-27q8 | Exploit Mitigation Vendor Advisory |
| https://github.com/middleapi/orpc/security/advisories/GHSA-7f6v-3gx7-27q8 | Exploit Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-24 20:16
Updated : 2026-03-26 13:26
NVD link : CVE-2026-33331
Mitre link : CVE-2026-33331
CVE.ORG link : CVE-2026-33331
JSON object : View
Products Affected
orpc
- orpc
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
