Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2022-32772 — Cross-site Scripting in Avideo
Severity
6.1MEDIUMNVD
EPSS
7.8%
top 8.01%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedAug 22
Latest updateAug 23
Description
A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the "msg" parameter which is inserted into the document with insufficient sanitization.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7
Affected Packages2 packages
🔴Vulnerability Details
1GHSA▶
GHSA-578g-7pcp-xjj4: A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11↗2022-08-23
💥Exploits & PoCs
1Nuclei▶
WWBN AVideo 11.6 - Cross-Site Scripting