{"api_version":"1","generated_at":"2026-04-22T22:51:00+00:00","cve":"CVE-2022-24855","urls":{"html":"https://cve.report/CVE-2022-24855","api":"https://cve.report/api/cve/CVE-2022-24855.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-24855","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-24855"},"summary":{"title":"CVE-2022-24855","description":"Metabase is an open source business intelligence and analytics application. In affected versions Metabase ships with an internal development endpoint `/_internal` that can allow for cross site scripting (XSS) attacks, potentially leading to phishing attempts with malicious links that could lead to account takeover. Users are advised to either upgrade immediately, or block access in your firewall to `/_internal` endpoints for Metabase. The following patches (or greater versions) are available: 0.42.4 and 1.42.4, 0.41.7 and 1.41.7, 0.40.8 and 1.40.8.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-04-14 22:15:00","updated_at":"2022-04-22 18:44:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://github.com/metabase/metabase/security/advisories/GHSA-wjw6-wm9w-7ggr","name":"https://github.com/metabase/metabase/security/advisories/GHSA-wjw6-wm9w-7ggr","refsource":"CONFIRM","tags":[],"title":"XSS vulnerability in /_internal endpoint · Advisory · metabase/metabase · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/metabase/metabase/releases/tag/v0.42.4","name":"https://github.com/metabase/metabase/releases/tag/v0.42.4","refsource":"MISC","tags":[],"title":"Release Metabase v0.42.4 · metabase/metabase · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-24855","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24855","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"24855","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"metabase","cpe5":"metabase","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-24855","STATE":"PUBLIC","TITLE":"XSS vulnerability in Metabase"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"metabase","version":{"version_data":[{"version_value":">= 1.40.0, < 1.40.8"},{"version_value":">= 0.40.0, < 0.40.8"},{"version_value":">= 1.41.0, < 1.41.7"},{"version_value":">= 0.41.0, < 0.41.7"},{"version_value":">= 1.42.0, < 1.42.4"},{"version_value":">= 0.42.0, < 0.42.4"}]}}]},"vendor_name":"metabase"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Metabase is an open source business intelligence and analytics application. In affected versions Metabase ships with an internal development endpoint `/_internal` that can allow for cross site scripting (XSS) attacks, potentially leading to phishing attempts with malicious links that could lead to account takeover. Users are advised to either upgrade immediately, or block access in your firewall to `/_internal` endpoints for Metabase. The following patches (or greater versions) are available: 0.42.4 and 1.42.4, 0.41.7 and 1.41.7, 0.40.8 and 1.40.8."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"}]}]},"references":{"reference_data":[{"name":"https://github.com/metabase/metabase/security/advisories/GHSA-wjw6-wm9w-7ggr","refsource":"CONFIRM","url":"https://github.com/metabase/metabase/security/advisories/GHSA-wjw6-wm9w-7ggr"},{"name":"https://github.com/metabase/metabase/releases/tag/v0.42.4","refsource":"MISC","url":"https://github.com/metabase/metabase/releases/tag/v0.42.4"}]},"source":{"advisory":"GHSA-wjw6-wm9w-7ggr","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-04-14 22:15:00","lastModifiedDate":"2022-04-22 18:44:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.5},"severity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"0.42.0","versionEndExcluding":"0.42.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"1.42.0","versionEndExcluding":"1.42.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"1.41.0","versionEndExcluding":"1.41.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"0.41.0","versionEndExcluding":"0.41.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"1.40.0","versionEndExcluding":"1.40.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"0.40.0","versionEndExcluding":"0.40.8","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"24855","Ordinal":"228198","Title":"CVE-2022-24855","CVE":"CVE-2022-24855","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"24855","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}