CVE-2022-36080
Published on: Not Yet Published
Last Modified on: 09/12/2022 06:24:00 PM UTC
Certain versions of Wikmd from Wikmd Project contain the following vulnerability:
Wikmd is a file based wiki that uses markdown. Prior to version 1.7.1, an attacker could capture user's session cookies or execute malicious Javascript when a victim edits a markdown file. Version 1.7.1 fixes this issue.
- CVE-2022-36080 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software: Linbreux - wikmd version < 1.7.1
CVSS3 Score: 6.1 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
CHANGED | LOW | LOW | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Merge pull request from GHSA-9m4m-6gqx-gfj3 · Linbreux/wikmd@259412c · GitHub | github.com text/html | MISC github.com/Linbreux/wikmd/commit/259412c47d64d5b85980f95345179fbf05927798 |
Prevent Cross-site Scripting when editing makdown file · Advisory · Linbreux/wikmd · GitHub | github.com text/html | CONFIRM github.com/Linbreux/wikmd/security/advisories/GHSA-9m4m-6gqx-gfj3 |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Wikmd Project | Wikmd | All | All | All | All |
- cpe:2.3:a:wikmd_project:wikmd:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
/r/netcve | CVE-2022-36080 | 2022-09-07 21:39:09 |