CVE-2022-22116

In Directus, versions 9.0.0-alpha.4 through 9.4.1 are vulnerable to stored Cross-Site Scripting (XSS) vulnerability via SVG file upload in media upload functionality. A low privileged attacker can inject arbitrary javascript code which will be executed in a victim’s browser when they open the image URL.
Cross-site Scripting
Severity
MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Atk. Vector
NETWORK
Atk. Complexity
LOW
Priv. Required
LOW
Base Score
CVSS 3.x
EPSS Score
Percentile: 22%
VendorProductVersion
rangerstudiodirectus
9.0.1 ≤
𝑥
≤ 9.4.1
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
rangerstudiodirectus
9.0.0
𝑥
= Vulnerable software versions