


Perceptive Security
SOC/SIEM Consultancy

oRPC is an tool that helps build APIs that are end-to-end type-safe and adhere to OpenAPI standards. Prior to version 1.13.9, a stored cross-site scripting (XSS…
Published:
23 March 2026 at 23:00:00
Alert date:
24 March 2026 at 21:04:18
Source:
nvd.nist.gov
Web Technologies, Supply Chain & Dependencies
A stored cross-site scripting (XSS) vulnerability exists in oRPC, a tool for building type-safe APIs that adhere to OpenAPI standards. The vulnerability affects versions prior to 1.13.9 and occurs in the OpenAPI documentation generation feature. Attackers who can control any field within the OpenAPI specification (such as info.description) can break out of the JSON context and execute arbitrary JavaScript when users view the generated API documentation. This represents a significant security risk as it allows code execution in users' browsers. The issue has been patched in version 1.13.9, and users should upgrade immediately to mitigate this vulnerability.
Technical details
Mitigation steps:
Affected products:
oRPC
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-33331
https://github.com/middleapi/orpc/commit/4f0efa8a1d3fa8e8317a4b03cc3945a5dfd68add
https://github.com/middleapi/orpc/releases/tag/v1.13.9
https://github.com/middleapi/orpc/security/advisories/GHSA-7f6v-3gx7-27q8
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
