Vulnerability Details : CVE-2022-23915
The package weblate from 0 and before 4.11.1 are vulnerable to Remote Code Execution (RCE) via argument injection when using git or mercurial repositories. Authenticated users, can change the behavior of the application in an unintended way, leading to command execution.
Vulnerability category: Execute code
Products affected by CVE-2022-23915
- cpe:2.3:a:weblate:weblate:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-23915
0.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 66 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-23915
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
Snyk |
CWE ids for CVE-2022-23915
-
The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-23915
-
https://github.com/WeblateOrg/weblate/pull/7337
vcs: Improve mercurial parameters handling by nijel · Pull Request #7337 · WeblateOrg/weblate · GitHubPatch;Third Party Advisory
-
https://snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088
Remote Code Execution (RCE) in weblate | CVE-2022-23915 | SnykPatch;Third Party Advisory
-
https://github.com/WeblateOrg/weblate/releases/tag/weblate-4.11.1
Release Weblate 4.11.1 · WeblateOrg/weblate · GitHubPatch;Release Notes;Third Party Advisory
-
https://github.com/WeblateOrg/weblate/pull/7338
vcs: Improve git parameters handling by nijel · Pull Request #7338 · WeblateOrg/weblate · GitHubPatch;Third Party Advisory
Jump to