Vulnerability Description
Raiden MAILD Mail Server website mail field has insufficient filtering for user input. A remote attacker with general user privilege can send email using the website with malicious JavaScript in the input field, which triggers XSS (Reflected Cross-Site Scripting) attack to the mail recipient.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Raidenmaild | Raidenmaild | < 4.7.4 |
Related Weaknesses (CWE)
References
- https://www.twcert.org.tw/tw/cp-132-6743-0a2c4-1.htmlThird Party Advisory
- https://www.twcert.org.tw/tw/cp-132-6743-0a2c4-1.htmlThird Party Advisory
FAQ
What is CVE-2022-41676?
CVE-2022-41676 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Raiden MAILD Mail Server website mail field has insufficient filtering for user input. A remote attacker with general user privilege can send email using the website with malicious JavaScript in the i...
How severe is CVE-2022-41676?
CVE-2022-41676 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-41676?
Check the references section above for vendor advisories and patch information. Affected products include: Raidenmaild Raidenmaild.