Lucene search

K
cve[email protected]CVE-2022-41938
HistoryNov 19, 2022 - 1:15 a.m.

CVE-2022-41938

2022-11-1901:15:10
CWE-79
web.nvd.nist.gov
72
3
flarum
open source
discussion platform
xss vulnerability
v1.5.0
v1.6.1
v1.6.2
security patch

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

26.0%

Flarum is an open source discussion platform. Flarum’s page title system allowed for page titles to be converted into HTML DOM nodes when pages were rendered. The change was made after v1.5 and was not noticed. This allowed an attacker to inject malicious HTML markup using a discussion title input, either by creating a new discussion or renaming one. The XSS attack occurs after a visitor opens the relevant discussion page. All communities running Flarum from v1.5.0 to v1.6.1 are impacted. The vulnerability has been fixed and published as flarum/core v1.6.2. All communities running Flarum from v1.5.0 to v1.6.1 have to upgrade as soon as possible to v1.6.2. There are no known workarounds for this issue.

Affected configurations

Vulners
NVD
Node
flarumflarumRange1.5.01.6.2
VendorProductVersionCPE
flarumflarum*cpe:2.3:a:flarum:flarum:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "flarum",
    "product": "framework",
    "versions": [
      {
        "version": ">= 1.5.0, < 1.6.2",
        "status": "affected"
      }
    ]
  }
]

Social References

More

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

26.0%

Related for CVE-2022-41938