top of page
perceptive_background_267k.jpg

oRPC is an tool that helps build APIs that are end-to-end type-safe and adhere to OpenAPI standards. Prior to version 1.13.9, a stored cross-site scripting (XSS…

Published:

23 March 2026 at 23:00:00

Alert date:

24 March 2026 at 21:04:18

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Supply Chain & Dependencies

A stored cross-site scripting (XSS) vulnerability exists in oRPC, a tool for building type-safe APIs that adhere to OpenAPI standards. The vulnerability affects versions prior to 1.13.9 and occurs in the OpenAPI documentation generation feature. Attackers who can control any field within the OpenAPI specification (such as info.description) can break out of the JSON context and execute arbitrary JavaScript when users view the generated API documentation. This represents a significant security risk as it allows code execution in users' browsers. The issue has been patched in version 1.13.9, and users should upgrade immediately to mitigate this vulnerability.

Technical details

Mitigation steps:

Affected products:

oRPC

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page