VMware vSphere Client XSS Flaw: When Scripts Go Wild!
The VMware vSphere Client 8.0.3.0 is facing a reflected XSS vulnerability, allowing hackers to inject malicious scripts via the `/folder` endpoint. This bug can trigger JavaScript execution if you’re logged in—so maybe think twice before clicking that sketchy link during your next coffee break!

Hot Take:
Looks like VMware vSphere is having a bit of a “reflection” problem! Who knew their client version 8.0.3.0 would be so vulnerable to XSS attacks? Maybe it’s time they introspect and sanitize their input better. If only they could reflect on their coding decisions as well as they reflect scripts!
Key Points:
- VMware vSphere Client 8.0.3.0 is vulnerable to reflected XSS attacks.
- The vulnerability stems from unsanitized input in the `/folder` endpoint.
- The attack requires an active session for execution.
- Successful exploitation could lead to serious security breaches like session hijacking.
- VMware advises upgrading to version 8.0 U3e or later to patch the flaw.
Already a member? Log in here