CVE-2022-36446
high-risk
Published 2022-07-25
software/apt-lib.pl in Webmin before 1.997 lacks HTML escaping for a UI command.
Do I need to act?
!
92.9% chance of exploitation in next 30 days
EPSS score — higher than 7% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
+
Fix available
Upgrade to: a6cb4c8041a040621d00c3dccb2d3730f2f13b47, 13f7bf9621a82d93f1e9dbd838d1e22020221bde
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (12)
Third Party Advisory
http://packetstormsecurity.com/files/167894/Webmin-1.996-Remote-Code-Execution.h...
Release Notes
https://github.com/webmin/webmin/compare/1.996...1.997
Third Party Advisory
https://www.exploit-db.com/exploits/50998
Third Party Advisory
http://packetstormsecurity.com/files/167894/Webmin-1.996-Remote-Code-Execution.h...
Release Notes
https://github.com/webmin/webmin/compare/1.996...1.997
Third Party Advisory
https://www.exploit-db.com/exploits/50998
57
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
20/34 · Moderate
Exposure
5/34 · Minimal