Vulnerability Description
In Recipes, versions 0.17.0 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in the ‘Name’ field of Keyword, Food and Unit components. When a victim accesses the Keyword/Food/Unit endpoints, the XSS payload will trigger. A low privileged attacker will have the victim's API key and can lead to admin's account takeover.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tandoor | Recipes | >= 0.17.0, <= 1.2.5 |
Related Weaknesses (CWE)
References
- https://github.com/TandoorRecipes/recipes/commit/7b2117c0190d4f541ba4cc7ee4122f0PatchThird Party Advisory
- https://www.mend.io/vulnerability-database/CVE-2022-23074ExploitThird Party Advisory
- https://github.com/TandoorRecipes/recipes/commit/7b2117c0190d4f541ba4cc7ee4122f0PatchThird Party Advisory
- https://www.mend.io/vulnerability-database/CVE-2022-23074ExploitThird Party Advisory
FAQ
What is CVE-2022-23074?
CVE-2022-23074 is a vulnerability with a CVSS score of 3.5 (LOW). In Recipes, versions 0.17.0 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in the ‘Name’ field of Keyword, Food and Unit components. When a victim accesses the Keyword/Food/Unit en...
How severe is CVE-2022-23074?
CVE-2022-23074 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-23074?
Check the references section above for vendor advisories and patch information. Affected products include: Tandoor Recipes.