Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings are properly escaped when rendered.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7048 | Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings are properly escaped when rendered. |
Github GHSA |
GHSA-7pfc-cc9x-8p4m | Apache Isis Cross-site Scripting vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 08 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-05-08T19:54:09.104Z
Reserved: 2022-10-07T00:00:00.000Z
Link: CVE-2022-42466
Updated: 2024-08-03T13:10:40.438Z
Status : Modified
Published: 2022-10-19T08:15:11.340
Modified: 2025-05-08T20:15:22.127
Link: CVE-2022-42466
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA