Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings are properly escaped when rendered.

Project Subscriptions

Vendors Products
Advisories
Source ID Title
EUVD EUVD EUVD-2022-7048 Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings are properly escaped when rendered.
Github GHSA Github GHSA GHSA-7pfc-cc9x-8p4m Apache Isis Cross-site Scripting vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.03483}

epss

{'score': 0.05019}


Thu, 08 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-05-08T19:54:09.104Z

Reserved: 2022-10-07T00:00:00.000Z

Link: CVE-2022-42466

cve-icon Vulnrichment

Updated: 2024-08-03T13:10:40.438Z

cve-icon NVD

Status : Modified

Published: 2022-10-19T08:15:11.340

Modified: 2025-05-08T20:15:22.127

Link: CVE-2022-42466

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses