CVE-2022-4396
low-risk
Published 2022-12-10
A vulnerability was found in RDFlib pyrdfa3 and classified as problematic. This issue affects the function _get_option of the file pyRdfa/__init__.py. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is ffd1d62dd50d5f4190013b39cedcdfbd81f3ce3e. It is recommended to apply a patch to fix this issue. The identifier VDB-215249 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Do I need to act?
-
0.42% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.5/10
Low
NETWORK
/ LOW complexity
Affected Products (1)
Pyrdfa3
Affected Vendors
References (6)
Issue Tracking
https://github.com/RDFLib/pyrdfa3/pull/40
Third Party Advisory
https://vuldb.com/?id.215249
Issue Tracking
https://github.com/RDFLib/pyrdfa3/pull/40
Third Party Advisory
https://vuldb.com/?id.215249
23
/ 100
low-risk
Severity
16/34 · Moderate
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal