Workbench is a suite of tools for administrators and developers to interact with Salesforce.com organizations via the Force.com APIs. Prior to 65.0.0, Workbench contains a reflected cross-site scripting vulnerability via the footerScripts parameter, which does not sanitize user-supplied input before rendering it in the page response. Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Workbench allows XSS Targeting Error Pages. This vulnerability is fixed in 65.0.0.
History

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Forceworkbench
Forceworkbench forceworkbench
Vendors & Products Forceworkbench
Forceworkbench forceworkbench

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Description Workbench is a suite of tools for administrators and developers to interact with Salesforce.com organizations via the Force.com APIs. Prior to 65.0.0, Workbench contains a reflected cross-site scripting vulnerability via the footerScripts parameter, which does not sanitize user-supplied input before rendering it in the page response. Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Workbench allows XSS Targeting Error Pages. This vulnerability is fixed in 65.0.0.
Title Reflected XSS in footer.php in Workbench Allows Attackers to Hijack Authenticated Sessions
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-04-06T15:58:45.583Z

Updated: 2026-04-07T14:18:59.617Z

Reserved: 2026-03-31T17:27:08.661Z

Link: CVE-2026-34951

cve-icon Vulnrichment

Updated: 2026-04-07T14:18:48.440Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-06T16:16:38.170

Modified: 2026-04-07T15:17:40.793

Link: CVE-2026-34951

cve-icon Redhat

No data.