{ "schema_version": "1.4.0", "id": "GHSA-8w8g-mvf3-8xmp", "modified": "2022-12-21T18:30:22Z", "published": "2022-12-21T18:30:22Z", "aliases": [ "CVE-2022-4560" ], "details": "A vulnerability was found in Joget up to 7.0.32. It has been rated as problematic. This issue affects the function getInternalJsCssLib of the file wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java of the component wflow-core. The manipulation of the argument key leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 8.0-BETA is able to address this issue. The name of the patch is ecf8be8f6f0cb725c18536ddc726d42a11bdaa1b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215963.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4560" }, { "type": "WEB", "url": "https://github.com/jogetworkflow/jw-community/commit/ecf8be8f6f0cb725c18536ddc726d42a11bdaa1b" }, { "type": "WEB", "url": "https://github.com/jogetworkflow/jw-community/releases/tag/7.0.32" }, { "type": "WEB", "url": "https://github.com/jogetworkflow/jw-community/releases/tag/8.0-BETA" }, { "type": "WEB", "url": "https://vuldb.com/?id.215963" } ], "database_specific": { "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-12-16T17:15:00Z" } }