Ad

CVE-2026-33506

HIGH CVSS 3.1: 8.8 EPSS 0.07%
Updated Apr 17, 2026
Ory
Parameter Value
CVSS 8.8 (HIGH)
Affected Versions before 26.2.0
Fixed In 26.2.0
Type CWE-601 (Open Redirect), CWE-87
Vendor Ory
Public PoC No

Ory Polis, formerly known as BoxyHQ Jackson, bridges or proxies a SAML login flow to OAuth 2.0 or OpenID Connect. Versions prior to 26.2.0 contain a DOM-based Cross-Site Scripting (XSS) vulnerability in Ory Polis's login functionality. The application improperly trusts a URL parameter (`callbackUrl`), which is passed to `router.push`.

An attacker can craft a malicious link that, when opened by an authenticated user (or an unauthenticated user that later logs in), performs a client-side redirect and executes arbitrary JavaScript in the context of their browser. This could lead to credential theft, internal network pivoting, and unauthorized actions performed on behalf of the victim. Version 26.2.0 contains a patch for the issue.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
Low
Partial data modification
Availability
Low
Partial disruption

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Ory Polis
cpe:2.3:a:ory:polis:*:*:*:*:*:*:*:*
26.2.0