CVE-2022-31136

Bookwyrm is an open source social reading and reviewing program. Versions of Bookwyrm prior to 0.4.1 did not properly sanitize html being rendered to users. Unprivileged users are able to inject scripts into user profiles, book descriptions, and statuses. These vulnerabilities may be exploited as cross site scripting attacks on users viewing these fields. Users are advised to upgrade to version 0.4.1. There are no known workarounds for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:joinbookwyrm:bookwyrm:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:03

Type Values Removed Values Added
CVSS v2 : 4.3
v3 : 6.1
v2 : 4.3
v3 : 6.3
References () https://github.com/bookwyrm-social/bookwyrm/commit/fe33fdcf564a6a5667aef75d5456bea08feab50d - Patch, Third Party Advisory () https://github.com/bookwyrm-social/bookwyrm/commit/fe33fdcf564a6a5667aef75d5456bea08feab50d - Patch, Third Party Advisory
References () https://github.com/bookwyrm-social/bookwyrm/security/advisories/GHSA-2cfh-v7rf-pxfp - Third Party Advisory () https://github.com/bookwyrm-social/bookwyrm/security/advisories/GHSA-2cfh-v7rf-pxfp - Third Party Advisory

Information

Published : 2022-07-07 18:15

Updated : 2024-11-21 07:03


NVD link : CVE-2022-31136

Mitre link : CVE-2022-31136

CVE.ORG link : CVE-2022-31136


JSON object : View

Products Affected

joinbookwyrm

  • bookwyrm
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')