Vulnerability Details : CVE-2022-0896
Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository microweber/microweber prior to 1.3.
Products affected by CVE-2022-0896
- cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-0896
0.28%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 65 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-0896
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
7.1
|
HIGH | CVSS:3.0/AV:P/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:H |
0.5
|
6.0
|
huntr.dev | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2022-0896
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
-
The product uses a template engine to insert or process externally-influenced input, but it does not neutralize or incorrectly neutralizes special elements or syntax that can be interpreted as template expressions or other code directives when processed by the engine.Assigned by: security@huntr.dev (Secondary)
References for CVE-2022-0896
-
https://github.com/microweber/microweber/commit/e0224462b3dd6b1f7c6ec1197413afc6019bc3b5
Update AdminCommentController.php · microweber/microweber@e022446 · GitHubPatch;Third Party Advisory
-
https://huntr.dev/bounties/113056f1-7a78-4205-9f42-940ad41d8df0
Improper Neutralization of Special Elements Used in a Template Engine vulnerability found in microweberExploit;Patch;Third Party Advisory
Jump to