CVE-2022-42466

Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings are properly escaped when rendered.
Cross-site Scripting
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.1 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
apacheCNA
---
---
CVEADP
---
---
CISA-ADPADP
6.1 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 86%
VendorProductVersion
apacheisis
𝑥
< 2.0.0
apacheisis
2.0.0:milestone1
apacheisis
2.0.0:milestone2
apacheisis
2.0.0:milestone3
apacheisis
2.0.0:milestone4
apacheisis
2.0.0:milestone5
apacheisis
2.0.0:milestone6
apacheisis
2.0.0:milestone7
apacheisis
2.0.0:milestone8
𝑥
= Vulnerable software versions