CVE-2026-32859 Overview
ByteDance Deer-Flow versions prior to commit 5dbb362 contain a stored cross-site scripting (XSS) vulnerability in the artifacts API. This vulnerability allows attackers to execute arbitrary scripts by uploading malicious HTML or script content as artifacts. When users view these artifacts, the malicious content executes in the browser context, potentially leading to session compromise, credential theft, and arbitrary script execution.
Critical Impact
Attackers can persist malicious scripts in the Deer-Flow artifacts system, executing in any user's browser context when viewing compromised artifacts. This enables session hijacking, credential theft, and unauthorized actions performed under the victim's identity.
Affected Products
- ByteDance Deer-Flow versions prior to commit 5dbb3623b2f0e490c8bb3cd81b1e3b1b12eae1a6
Discovery Timeline
- 2026-03-27 - CVE-2026-32859 published to NVD
- 2026-03-30 - Last updated in NVD database
Technical Details for CVE-2026-32859
Vulnerability Analysis
This stored XSS vulnerability (CWE-79) exists in the Deer-Flow artifacts API, which handles the storage and rendering of user-uploaded artifacts. The core issue stems from insufficient input sanitization and output encoding when processing artifact content. When a user uploads an artifact containing malicious HTML or JavaScript, the application stores this content without proper sanitization. Subsequently, when other users view the artifact through the web interface, the malicious content is rendered inline without adequate encoding, causing the embedded scripts to execute in the victim's browser context.
The network-accessible nature of this vulnerability means attackers can remotely exploit it, though successful exploitation requires low privileges (authenticated access to upload artifacts) and user interaction (a victim must view the compromised artifact).
Root Cause
The vulnerability originates from improper neutralization of user-supplied input in the artifacts API. Specifically, the application fails to sanitize or encode HTML and JavaScript content when artifacts are uploaded and subsequently rendered. This lack of input validation and output encoding allows attackers to inject executable script content that persists in the application's storage and executes when rendered in users' browsers.
Attack Vector
The attack leverages the artifacts API's inline rendering functionality. An attacker with upload privileges creates an artifact containing malicious script content (such as JavaScript payloads embedded in HTML). When the artifact is stored, the malicious content is preserved verbatim. Any user who subsequently views this artifact through the Deer-Flow web interface triggers the execution of the embedded script in their browser session.
The vulnerability mechanism involves uploading specially crafted artifact content containing embedded JavaScript or malicious HTML elements. When artifacts are rendered inline without proper Content Security Policy enforcement or output encoding, the malicious payload executes. Common attack payloads target session cookies, perform keylogging, or redirect users to attacker-controlled sites. For detailed technical analysis, see the VulnCheck Advisory.
Detection Methods for CVE-2026-32859
Indicators of Compromise
- Artifacts containing unexpected HTML tags such as <script>, <iframe>, <object>, or event handlers like onerror, onload, onclick
- Unusual artifact uploads with content-types mismatched to file extensions
- Browser console errors or unexpected external resource loads when viewing artifacts
- Session anomalies or unexpected authentication events following artifact viewing
Detection Strategies
- Implement web application firewall (WAF) rules to detect and block XSS payloads in artifact upload requests
- Monitor artifact content for suspicious HTML/JavaScript patterns during upload processing
- Enable Content Security Policy (CSP) violation reporting to detect attempted script execution
- Review access logs for artifact endpoints showing patterns consistent with XSS probing
Monitoring Recommendations
- Enable detailed logging for all artifact API endpoints, capturing request bodies and response codes
- Configure browser-side CSP reporting to collect policy violation events
- Monitor for unusual session activity patterns that may indicate post-exploitation lateral movement
- Implement anomaly detection on artifact upload frequency and content characteristics
How to Mitigate CVE-2026-32859
Immediate Actions Required
- Update Deer-Flow to commit 5dbb3623b2f0e490c8bb3cd81b1e3b1b12eae1a6 or later immediately
- Audit existing artifacts for potentially malicious content before the patch is applied
- Implement strict Content Security Policy headers to mitigate script execution risks
- Consider temporarily disabling inline artifact rendering until the patch is deployed
Patch Information
ByteDance has addressed this vulnerability in commit 5dbb3623b2f0e490c8bb3cd81b1e3b1b12eae1a6. The fix implements proper input sanitization and output encoding for artifact content rendered through the web interface. Organizations should update to this commit or any subsequent version that includes this fix. For implementation details, see the GitHub Commit Reference and GitHub Pull Request #1389.
Workarounds
- Implement a reverse proxy or WAF rule to sanitize artifact content before rendering
- Configure Content Security Policy headers with script-src 'self' to block inline script execution
- Disable inline artifact rendering and force downloads instead, preventing browser-based script execution
- Restrict artifact upload permissions to trusted users only until the patch can be applied
To implement a basic CSP header as a workaround, add the following configuration to your web server or application:
# Nginx configuration example
add_header Content-Security-Policy "default-src 'self'; script-src 'self'; object-src 'none'; frame-ancestors 'self';" always;
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


