OpenObserve is a cloud-native observability platform. In versions up to and including 0.16.1, when creating or renaming an organization with HTML in the name, the markup is rendered inside the invitation email. This indicates that user-controlled input is inserted into the email template without proper HTML escaping. As of time of publication, no patched versions are available.
Metrics
Affected Vendors & Products
References
History
Fri, 14 Nov 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openobserve
Openobserve openobserve |
|
| Vendors & Products |
Openobserve
Openobserve openobserve |
Thu, 13 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Nov 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenObserve is a cloud-native observability platform. In versions up to and including 0.16.1, when creating or renaming an organization with HTML in the name, the markup is rendered inside the invitation email. This indicates that user-controlled input is inserted into the email template without proper HTML escaping. As of time of publication, no patched versions are available. | |
| Title | OpenObserve Vulnerable to HTML Injection in Organization Invitation Emails | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-11-13T20:30:20.960Z
Updated: 2025-11-13T21:14:33.407Z
Reserved: 2025-11-10T22:29:34.871Z
Link: CVE-2025-64744
Updated: 2025-11-13T21:14:21.734Z
Status : Awaiting Analysis
Published: 2025-11-13T21:15:54.073
Modified: 2025-11-14T16:42:03.187
Link: CVE-2025-64744
No data.