CVE-2026-1721
Severity CVSS v4.0:
MEDIUM
Type:
Unavailable / Other
Publication date:
13/02/2026
Last modified:
13/02/2026
Description
Summary<br />
<br />
A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the AI Playground&#39;s OAuth callback handler. The `error_description` query parameter was directly interpolated into an HTML script tag without proper escaping, allowing attackers to execute arbitrary JavaScript in the context of the victim&#39;s session.<br />
<br />
<br />
<br />
<br />
Root cause<br />
<br />
The OAuth callback handler in `site/ai-playground/src/server.ts` directly interpolated the `authError` value, sourced from the `error_description` query parameter, into an inline `` tag.<br />
<br />
<br />
Impact<br />
<br />
An attacker could craft a malicious link that, when clicked by a victim, would:<br />
<br />
* Steal user chat message history - Access all LLM interactions stored in the user&#39;s session.<br />
<br />
<br />
* Access connected MCP Servers - Interact with any MCP servers connected to the victim&#39;s session (public or authenticated/private), potentially allowing the attacker to perform actions on the victim&#39;s behalf<br />
<br />
<br />
<br />
<br />
<br />
Mitigation:<br />
<br />
* PR: https://github.com/cloudflare/agents/pull/841 https://github.com/cloudflare/agents/pull/841 <br />
<br />
<br />
<br />
<br />
* Agents-sdk users should upgrade to agents@0.3.10<br />
<br />
<br />
<br />
<br />
* Developers using configureOAuthCallback with custom error handling in their own applications should ensure all user-controlled input is escaped before interpolation.
Impact
Base Score 4.0
6.20
Severity 4.0
MEDIUM



