Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.3
CesiumJS: Sandcastle Demo Code Exposes Users to Remote Attacks
CVE-2026-3990
Summary
CesiumJS users should be aware that a vulnerability in the demo code for Sandcastle has been publicly disclosed, which could allow attackers to execute malicious code on a user's computer. This issue only affects the demo code, not the main CesiumJS library. The vendor has not provided a fix, so users should exercise caution and consider using a different demo or waiting for an update.
Original title
A security flaw has been discovered in CesiumGS CesiumJS up to 1.137.0. Affected by this issue is some unknown functionality of the file Apps/Sandcastle/standalone.html. The manipulation of the arg...
Original description
A security flaw has been discovered in CesiumGS CesiumJS up to 1.137.0. Affected by this issue is some unknown functionality of the file Apps/Sandcastle/standalone.html. The manipulation of the argument c results in cross site scripting. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The presence of this vulnerability remains uncertain at this time. The vendor was contacted early about this disclosure but did not respond in any way. According to CVE-2023-48094, "the vendor's position is that Apps/Sandcastle/standalone.html is part of the CesiumGS/cesium GitHub repository, but is demo code that is not part of the CesiumJS JavaScript library product."
nvd CVSS2.0
5.0
nvd CVSS3.1
4.3
nvd CVSS4.0
5.3
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
CWE-94
Code Injection
Published: 12 Mar 2026 · Updated: 14 Mar 2026 · First seen: 12 Mar 2026