Skip to main content

Recent Gainsight Assist Plugin Remediations (CVE-2026-31381 and CVE-2026-31382)

  • March 20, 2026
  • 0 replies
  • 88 views

Brent Krempges
Forum|alt.badge.img+6

Data security remains the top priority at Gainsight. Working with Rapid7 Labs, we have successfully addressed and resolved two vulnerabilities discovered within the Gainsight Assist Plugin. These specific CVEs (common vulnerabilities and exposures) are officially tracked as CVE-2026-31381 and CVE-2026-31382.

It's important to note there is no evidence of malicious activities associated with the vulnerabilities, and they were identified by Rapid7 Labs, who reached out to Gainsight as part of a responsible disclosure process. A comprehensive review of 12 months of platform telemetry confirmed no evidence of malicious exploitation or unauthorized access to customer data.

What Happened? Rapid7 Labs identified a chain of security vulnerabilities in the Gainsight Assist plugin and its interactions with the associated domain app.gainsight.com. The vulnerabilities include an information disclosure flaw (CVE-2026-31381) and a reflected cross-site scripting vulnerability (CVE-2026-31382). A complete overview of the vulnerabilities is available on the Rapid7 Labs Blog

Our Response & Remediation 

Upon notification, our team deployed a series of permanent, server-side fixes:

  • Architectural Hardening: We implemented a strict Content Security Policy (CSP) and migrated to a server-side validation model to prevent XSS and HTML injection, addressing CVE-2026-31382.
  • Enhanced Encryption: We transitioned to JSON Web Encryption (JWE) for the authentication state parameter, ensuring PII is encrypted and inaccessible to third-party logs, addressing CVE-2026-31381.
  • Forensic Verification: A comprehensive review of 12 months of platform telemetry confirmed no evidence of malicious exploitation or unauthorized access to customer data.

No Required Action For Customers

Security enhancements were implemented directly within our cloud infrastructure and both the Chrome and Outlook extensions have been updated; customers require no proactive action to be protected against the vulnerabilities. 

We’d like to thank the Rapid7 team for their contribution and appreciate collaboration with the wider security research community. Gainsight remains committed to fostering these relationships through our vulnerability disclosure program, ensuring we provide a secure platform and contribute to a more resilient community for our customers.

If customers have any questions, please email security@gainsight.com.

This topic has been closed for replies.