list filter field that, when visited by another user, enables the attacker to execute commands with the target's permissions, including an administrator.
This issue affects all versions of Junos Space before 24.1R5 Patch V3.
Project Subscriptions
No data.
No advisories yet.
Solution
The following software releases have been updated to resolve this specific issue: 24.1R5 Patch V3, and all subsequent releases.
Workaround
There are no known workarounds for this issue.
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA106003 |
|
Thu, 09 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the list filter field that, when visited by another user, enables the attacker to execute commands with the target's permissions, including an administrator. This issue affects all versions of Junos Space before 24.1R5 Patch V3. | |
| Title | Junos Space: ilpFilter field on nLegacy.jsp is vulnerable to reflected cross-site script injection | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2026-04-09T21:26:09.896Z
Reserved: 2026-01-05T17:32:48.709Z
Link: CVE-2026-21904
No data.
Status : Received
Published: 2026-04-09T22:16:24.557
Modified: 2026-04-09T22:16:24.557
Link: CVE-2026-21904
No data.
OpenCVE Enrichment
No data.