CVE-2022-4638 – collective-contact-widget
Package
Manager: pip
Name: collective-contact-widget
Vulnerable Version: =0.10 || =0.11 || =0.12 || =1.0 || =1.0rc1 || =1.1 || =1.10 || =1.11 || =1.12 || =1.2 || =1.2.1 || =1.2.2 || =1.3 || =1.4 || =1.5 || =1.6 || =1.7 || =1.8 || =1.9 || >=0 <1.13
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
EPSS: 0.00063 pctl0.19722
Details
collective.contact.widget is vulnerable to cross-site scripting collective.contact.widget is an add-on is part of the collective.contact.* suite. A vulnerability classified as problematic was found in collective.contact.widget up to 1.12. This vulnerability affects the function title of the file src/collective/contact/widget/widgets.py. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 5da36305ca7ed433782be8901c47387406fcda12. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216496.
Metadata
Created: 2022-12-22T00:30:36Z
Modified: 2024-09-13T15:25:50.374098Z
Source: https://osv-vulnerabilities
CWE IDs: ["CWE-707", "CWE-79"]
Alternative ID: N/A
Finding: F425
Auto approve: 1