← Retour aux CVEs
CVE-2022-50802
MEDIUM6.1
Description
ETAP Safety Manager 1.0.0.32 contains a cross-site scripting vulnerability in the 'action' GET parameter that allows unauthenticated attackers to inject malicious HTML and JavaScript. Attackers can craft specially formed requests to execute arbitrary scripts in victim browser sessions, potentially stealing credentials or performing unauthorized actions.
Details CVE
Score CVSS v3.16.1
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurREQUIRED
Publie12/30/2025
Derniere modification1/7/2026
Sourcenvd
Observations honeypot0
Produits affectes
etaplighting:etap_safety_manager
Faiblesses (CWE)
CWE-79
References
https://cxsecurity.com/issue/WLB-2022090031(disclosure@vulncheck.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/235743(disclosure@vulncheck.com)
https://packetstormsecurity.com/files/168339/(disclosure@vulncheck.com)
https://www.etaplighting.com/(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/etap-safety-manager-unauthenticated-reflected-cross-site-scripting-via-action-parameter(disclosure@vulncheck.com)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5711.php(disclosure@vulncheck.com)
https://cxsecurity.com/issue/WLB-2022090031(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5711.php(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.