Vulnerability Description
Stored XSS in "Name", "Group Name" & "Title" in GitHub repository polonel/trudesk prior to v1.2.0. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trudesk Project | Trudesk | < 1.2.0 |
Related Weaknesses (CWE)
References
- https://github.com/polonel/trudesk/commit/4f48b3bb86ba66a0085803591065bb6437e864PatchThird Party Advisory
- https://huntr.dev/bounties/da6d03e6-053f-43b6-99a7-78c2e386e3edExploitThird Party Advisory
- https://github.com/polonel/trudesk/commit/4f48b3bb86ba66a0085803591065bb6437e864PatchThird Party Advisory
- https://huntr.dev/bounties/da6d03e6-053f-43b6-99a7-78c2e386e3edExploitThird Party Advisory
FAQ
What is CVE-2022-1290?
CVE-2022-1290 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Stored XSS in "Name", "Group Name" & "Title" in GitHub repository polonel/trudesk prior to v1.2.0. This allows attackers to execute malicious scripts in the user's browser and it can lead to session h...
How severe is CVE-2022-1290?
CVE-2022-1290 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-1290?
Check the references section above for vendor advisories and patch information. Affected products include: Trudesk Project Trudesk.