Generated remediation guidance and an executive summary. No account required.
zrok is software for sharing web services, files, and network resources. Prior to version 2.0.1, the proxyUi template engine uses Go's text/template (which performs no HTML escaping) instead of html/template. The GitHub OAuth callback handlers in both publicProxy and dynamicProxy embed the attacker-controlled refreshInterval query parameter verbatim into an error message when time.ParseDuration fails, and render that error unescaped into HTML. An attacker can deliver a crafted login URL to a victim; after the victim completes the GitHub OAuth flow, the callback page executes arbitrary JavaScript in the OAuth server's origin. Version 2.0.1 patches the issue.
Use CWE-79, Netfoundry vendor hub and Zrok product page to widen CVE-2026-40302 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-40303 and CVE-2026-40304 for nearby disclosures in the same product family.