{"api_version":"1","generated_at":"2026-04-22T19:36:31+00:00","cve":"CVE-2022-4055","urls":{"html":"https://cve.report/CVE-2022-4055","api":"https://cve.report/api/cve/CVE-2022-4055.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-4055","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-4055"},"summary":{"title":"CVE-2022-4055","description":"When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2022-11-19 00:15:00","updated_at":"2022-11-26 03:18:00"},"problem_types":["CWE-146"],"metrics":[],"references":[{"url":"https://gitlab.freedesktop.org/xdg/xdg-utils/-/issues/205#note_1494267","name":"https://gitlab.freedesktop.org/xdg/xdg-utils/-/issues/205#note_1494267","refsource":"MISC","tags":[],"title":"xdg-email does not parse mailto uris properly for thunderbird (#205) · Issues · xdg / xdg-utils · GitLab","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-4055","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4055","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"4055","vulnerable":"1","versionEndIncluding":"1.1.3","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"xdg-utils","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-4055","qid":"354830","title":"Amazon Linux Security Advisory for xdg-utils : ALAS2-2023-2002"},{"cve":"CVE-2022-4055","qid":"355151","title":"Amazon Linux Security Advisory for xdg-utils : ALAS2023-2023-007"},{"cve":"CVE-2022-4055","qid":"904556","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for xdg-utils (11465)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-4055","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-146","cweId":"CWE-146"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"xdg-utils","version":{"version_data":[{"version_affected":"=","version_value":"xdg-utils 1.1.0 to and including 1.1.3"}]}}]}}]}},"references":{"reference_data":[{"url":"https://gitlab.freedesktop.org/xdg/xdg-utils/-/issues/205#note_1494267","refsource":"MISC","name":"https://gitlab.freedesktop.org/xdg/xdg-utils/-/issues/205#note_1494267"}]}},"nvd":{"publishedDate":"2022-11-19 00:15:00","lastModifiedDate":"2022-11-26 03:18:00","problem_types":["CWE-146"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.4,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:freedesktop:xdg-utils:*:*:*:*:*:*:*:*","versionStartIncluding":"1.1.0","versionEndIncluding":"1.1.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}