{"api_version":"1","generated_at":"2026-04-08T22:40:40+00:00","cve":"CVE-2022-0758","urls":{"html":"https://cve.report/CVE-2022-0758","api":"https://cve.report/api/cve/CVE-2022-0758.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-0758","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-0758"},"summary":{"title":"CVE-2022-0758","description":"Rapid7 Nexpose versions 6.6.129 and earlier suffer from a reflected cross site scripting vulnerability, within the shared scan configuration component of the tool. With this vulnerability an attacker could pass literal values as the test credentials, providing the opportunity for a potential XSS attack. This issue is fixed in Rapid7 Nexpose version 6.6.130.","state":"PUBLIC","assigner":"cve@rapid7.com","published_at":"2022-03-17 23:15:00","updated_at":"2022-03-24 19:22:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://docs.rapid7.com/release-notes/nexpose/20220309/","name":"https://docs.rapid7.com/release-notes/nexpose/20220309/","refsource":"CONFIRM","tags":[],"title":"Nexpose Release Notes","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-0758","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0758","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Aleksey Solovev","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"758","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rapid7","cpe5":"nexpose","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","generator":{"engine":"Vulnogram 0.0.9"},"CVE_data_meta":{"ID":"CVE-2022-0758","ASSIGNER":"cve@rapid7.com","DATE_PUBLIC":"2022-03-09T00:00:00.000Z","TITLE":"Rapid7 Nexpose Reflected XSS","AKA":"","STATE":"PUBLIC"},"source":{"defect":[],"advisory":"","discovery":"UNKNOWN"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Rapid7","product":{"product_data":[{"product_name":"Nexpose","version":{"version_data":[{"version_name":"6.6.129","version_affected":"<=","version_value":"6.6.129","platform":""}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-site Scripting (XSS)"}]}]},"description":{"description_data":[{"lang":"eng","value":"Rapid7 Nexpose versions 6.6.129 and earlier suffer from a reflected cross site scripting vulnerability, within the shared scan configuration component of the tool. With this vulnerability an attacker could pass literal values as the test credentials, providing the opportunity for a potential XSS attack. This issue is fixed in Rapid7 Nexpose version 6.6.130."}]},"references":{"reference_data":[{"refsource":"CONFIRM","url":"https://docs.rapid7.com/release-notes/nexpose/20220309/","name":"https://docs.rapid7.com/release-notes/nexpose/20220309/"}]},"configuration":[],"impact":{"cvss":{"version":"3.1","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":3.3,"baseSeverity":"LOW"}},"exploit":[],"work_around":[],"solution":[],"credit":[{"lang":"eng","value":"Aleksey Solovev"}]},"nvd":{"publishedDate":"2022-03-17 23:15:00","lastModifiedDate":"2022-03-24 19:22:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:rapid7:nexpose:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.130","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}