The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-0949

CVE-2026-0949: PEM Stored XSS Vulnerability

CVE-2026-0949 is a stored Cross-site Scripting flaw in PEM versions prior to 9.8.1 that lets privileged users inject JavaScript via chart creation. This article covers technical details, affected versions, and mitigation.

Published: January 23, 2026

CVE-2026-0949 Overview

CVE-2026-0949 is a stored Cross-Site Scripting (XSS) vulnerability affecting EnterpriseDB Postgres Enterprise Manager (PEM) versions prior to 9.8.1. This vulnerability allows authenticated users with access to the Manage Charts menu to inject arbitrary JavaScript code when creating a new chart. The malicious script is then executed in the browser context of any user who subsequently accesses the compromised chart.

Critical Impact

Attackers with administrative privileges can inject persistent malicious JavaScript that executes in victim browsers, potentially leading to session hijacking, credential theft, or further privilege escalation within the PEM management interface.

Affected Products

  • EnterpriseDB Postgres Enterprise Manager (PEM) versions prior to 9.8.1
  • Systems where users have pem_admin role privileges
  • Systems where users have pem_super_admin role privileges

Discovery Timeline

  • 2026-01-16 - CVE CVE-2026-0949 published to NVD
  • 2026-01-16 - Last updated in NVD database

Technical Details for CVE-2026-0949

Vulnerability Analysis

This stored XSS vulnerability (CWE-79) exists within the chart creation functionality of PEM's Manage Charts menu. The application fails to properly sanitize user-supplied input when creating new charts, allowing malicious JavaScript to be stored in the database and executed when other users view the affected chart.

By default, access to the Manage Charts menu is restricted to the superuser and users granted pem_admin or pem_super_admin privileges. While this limits the initial attack surface to privileged users, the stored nature of the vulnerability means that once injected, the malicious payload can target any user who views the compromised chart, including other administrators.

The vulnerability requires network access and high privileges to exploit, but no user interaction is needed from the attacker's perspective once the payload is planted. Successful exploitation can result in high confidentiality and integrity impacts, as attackers can steal session tokens, perform actions on behalf of victims, or exfiltrate sensitive database management information.

Root Cause

The root cause of this vulnerability is insufficient input validation and output encoding within the chart creation workflow. When users create new charts through the Manage Charts interface, the application stores user-provided data without proper sanitization. Subsequently, when rendering charts for display, the application fails to encode this data appropriately, allowing embedded JavaScript to execute in the context of the viewing user's browser session.

Attack Vector

The attack vector involves an authenticated attacker with administrative privileges (superuser, pem_admin, or pem_super_admin) accessing the Manage Charts menu and creating a new chart containing malicious JavaScript in one of the chart configuration fields. The payload is stored server-side and persists until the chart is deleted or modified.

When any other user navigates to view the compromised chart, the stored JavaScript executes within their browser with the permissions of their authenticated session. This can enable the attacker to:

  • Steal session cookies or authentication tokens
  • Perform unauthorized actions on behalf of the victim
  • Redirect users to phishing pages
  • Exfiltrate sensitive information displayed in the PEM interface

The vulnerability mechanism centers on the chart rendering process where user-supplied chart configuration data is inserted into the page without proper HTML entity encoding or Content Security Policy protections. For technical implementation details, refer to the EnterpriseDB Security Advisory.

Detection Methods for CVE-2026-0949

Indicators of Compromise

  • Unusual JavaScript patterns in chart configuration data stored in the PEM database
  • Unexpected outbound network requests originating from user browsers when viewing charts
  • Audit log entries showing chart creation or modification by privileged users followed by unusual activity from other accounts
  • Browser console errors or unexpected script execution when viewing specific charts

Detection Strategies

  • Implement web application firewall (WAF) rules to detect common XSS payloads in requests to chart management endpoints
  • Monitor PEM audit logs for suspicious chart creation or modification activities by privileged users
  • Deploy browser-based XSS detection tools that can identify script injection attempts
  • Review chart configurations in the database for HTML/JavaScript content that should not be present

Monitoring Recommendations

  • Enable verbose logging for the Manage Charts functionality to track all chart creation and modification events
  • Implement Content Security Policy (CSP) headers with script-src restrictions to limit script execution sources
  • Configure SentinelOne to monitor for anomalous browser behavior and unexpected script execution patterns
  • Set up alerts for database queries or modifications involving chart configuration tables

How to Mitigate CVE-2026-0949

Immediate Actions Required

  • Upgrade EnterpriseDB PEM to version 9.8.1 or later immediately
  • Review existing charts in the system for any suspicious JavaScript content
  • Audit access to the Manage Charts menu and verify that only trusted administrators have pem_admin or pem_super_admin privileges
  • Temporarily restrict access to the Manage Charts functionality if immediate patching is not possible

Patch Information

EnterpriseDB has addressed this vulnerability in PEM version 9.8.1. Organizations should upgrade to this version or later to remediate the stored XSS vulnerability. The security advisory and upgrade instructions are available from EnterpriseDB Security Advisory.

Workarounds

  • Restrict access to the Manage Charts menu to only essential personnel until patching is completed
  • Implement a Web Application Firewall (WAF) with XSS filtering rules in front of the PEM interface
  • Deploy Content Security Policy (CSP) headers to restrict inline script execution
  • Conduct regular audits of chart configurations to identify and remove any malicious payloads
bash
# Example: Implement CSP headers in your reverse proxy (nginx)
# Add to your nginx configuration for the PEM application
add_header Content-Security-Policy "default-src 'self'; script-src 'self'; object-src 'none';" always;
add_header X-XSS-Protection "1; mode=block" always;
add_header X-Content-Type-Options "nosniff" always;

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeXSS

  • Vendor/TechPem

  • SeverityMEDIUM

  • CVSS Score6.5

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-79
  • Technical References
  • EnterpriseDB Security Advisory
  • Latest CVEs
  • CVE-2025-9185: Mozilla Firefox RCE Vulnerability

  • CVE-2025-9184: Mozilla Firefox RCE Vulnerability

  • CVE-2025-9180: Mozilla Firefox Auth Bypass Vulnerability

  • CVE-2025-8030: Mozilla Firefox RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English