OMERO.web provides a web based client and plugin infrastructure. There is currently no escaping or validation of the `callback` parameter that can be passed to various OMERO.web endpoints that have JSONP enabled. This vulnerability has been patched in version 5.26.0.
                
            References
                    Configurations
                    History
                    29 Sep 2025, 18:01
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Openmicroscopy omero-web Openmicroscopy | |
| CPE | cpe:2.3:a:openmicroscopy:omero-web:*:*:*:*:*:*:*:* | |
| References | () https://github.com/ome/omero-web/commit/d41207cbb82afc56ea79e84db532608aa24ab4aa - Patch | |
| References | () https://github.com/ome/omero-web/security/advisories/GHSA-vr85-5pwx-c6gq - Vendor Advisory | 
Information
                Published : 2024-05-21 13:15
Updated : 2025-09-29 18:01
NVD link : CVE-2024-35180
Mitre link : CVE-2024-35180
CVE.ORG link : CVE-2024-35180
JSON object : View
Products Affected
                openmicroscopy
- omero-web
CWE
                
                    
                        
                        CWE-830
                        
            Inclusion of Web Functionality from an Untrusted Source
