CVE-2022-4513
low-risk
Published 2022-12-15
A vulnerability, which was classified as problematic, has been found in European Environment Agency eionet.contreg. This issue affects some unknown processing. The manipulation of the argument searchTag/resourceUri leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2022-06-27T0948 is able to address this issue. The name of the patch is a120c2153e263e62c4db34a06ab96a9f1c6bccb6. It is recommended to upgrade the affected component. The identifier VDB-215885 was assigned to this vulnerability.
Do I need to act?
-
0.27% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.5/10
Low
NETWORK
/ LOW complexity
Affected Products (1)
Eionet Content Registry
Affected Vendors
References (6)
Third Party Advisory
https://github.com/eea/eionet.contreg/releases/tag/2022-06-27T0948
Third Party Advisory
https://vuldb.com/?id.215885
Third Party Advisory
https://github.com/eea/eionet.contreg/releases/tag/2022-06-27T0948
Third Party Advisory
https://vuldb.com/?id.215885
22
/ 100
low-risk
Severity
16/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal