CVE-2023-23630
moderate-risk
Published 2023-02-01
Eta is an embedded JS templating engine that works inside Node, Deno, and the browser. XSS attack - anyone using the Express API is impacted. The problem has been resolved. Users should upgrade to version 2.0.0. As a workaround, don't pass user supplied things directly to `res.render`.
Do I need to act?
-
0.40% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.6/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (6)
Release Notes
https://github.com/eta-dev/eta/releases/tag/v2.0.0
Third Party Advisory
https://github.com/eta-dev/eta/security/advisories/GHSA-xrh7-m5pp-39r6
Release Notes
https://github.com/eta-dev/eta/releases/tag/v2.0.0
Third Party Advisory
https://github.com/eta-dev/eta/security/advisories/GHSA-xrh7-m5pp-39r6
36
/ 100
moderate-risk
Severity
29/34 · Critical
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal