MeterSphere is a one-stop open source continuous testing platform, covering test management, interface testing, UI testing and performance testing. Versions prior to 2.5.0 are subject to a Server-Side Request Forgery that leads to Cross-Site Scripting. A Server-Side request forgery in `IssueProxyResourceService::getMdImageByUrl` allows an attacker to access internal resources, as well as executing JavaScript code in the context of Metersphere's origin by a victim of a reflected XSS. This vulnerability has been fixed in v2.5.0. There are no known workarounds.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 11 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-04-11T16:15:25.179Z

Reserved: 2022-01-19T21:23:53.798Z

Link: CVE-2022-23544

cve-icon Vulnrichment

Updated: 2024-08-03T03:43:46.454Z

cve-icon NVD

Status : Modified

Published: 2022-12-28T00:15:13.567

Modified: 2024-11-21T06:48:47.020

Link: CVE-2022-23544

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.