CVE-2022-37246: n/a in n/a
Craft CMS 4.2.0.1 is affected by Cross Site Scripting (XSS) in the file src/web/assets/cp/src/js/BaseElementSelectInput.js and in specific on the line label: elementInfo.label.
AI Analysis
Technical Summary
CVE-2022-37246 is a Cross Site Scripting (XSS) vulnerability identified in Craft CMS version 4.2.0.1. The vulnerability exists in the JavaScript file src/web/assets/cp/src/js/BaseElementSelectInput.js, specifically in the handling of the label property of elementInfo.label. This improper sanitization or encoding of user-controllable input allows an attacker to inject malicious scripts into the web interface. When a user with appropriate privileges interacts with the affected component, the malicious script can execute in their browser context. The vulnerability requires low privileges (PR:L) and user interaction (UI:R) to be exploited, and it affects the confidentiality and integrity of the affected system by potentially allowing session hijacking, credential theft, or unauthorized actions within the CMS. The CVSS score is 5.4 (medium severity), reflecting a network attack vector with low attack complexity but requiring some privileges and user interaction. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. No known exploits are reported in the wild, and no official patches or vendor project details are provided in the data. The underlying weakness is CWE-79, which is a common XSS vulnerability due to insufficient input validation or output encoding.
Potential Impact
For European organizations using Craft CMS 4.2.0.1, this vulnerability poses a moderate risk. Craft CMS is a popular content management system used by businesses, media companies, and government agencies for managing websites and digital content. Successful exploitation could allow attackers to execute arbitrary scripts in the context of authenticated users, potentially leading to session hijacking, theft of sensitive information, or unauthorized content manipulation. This could result in reputational damage, data breaches, and compliance violations under regulations such as GDPR. Since the vulnerability requires some level of privilege and user interaction, the risk is somewhat mitigated but still significant in environments where multiple users have CMS access. Attackers could target editors or administrators to escalate their access or pivot to other internal systems. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Identify all instances of Craft CMS 4.2.0.1 in their environment and assess exposure. 2) Apply any available vendor patches or updates as soon as they are released; if no official patch exists, consider upgrading to a later, unaffected version of Craft CMS. 3) Implement strict Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting script sources and execution contexts. 4) Conduct a thorough review of user privileges within the CMS to ensure the principle of least privilege is enforced, minimizing the number of users who can trigger the vulnerable code path. 5) Educate CMS users about phishing and social engineering risks to reduce the likelihood of user interaction leading to exploitation. 6) Monitor web server and application logs for suspicious activity related to the vulnerable component, including unusual requests or script injections. 7) Employ web application firewalls (WAF) with rules targeting XSS patterns to provide an additional layer of defense. 8) Regularly audit and sanitize all user-generated content and inputs that may be rendered in the CMS interface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2022-37246: n/a in n/a
Description
Craft CMS 4.2.0.1 is affected by Cross Site Scripting (XSS) in the file src/web/assets/cp/src/js/BaseElementSelectInput.js and in specific on the line label: elementInfo.label.
AI-Powered Analysis
Technical Analysis
CVE-2022-37246 is a Cross Site Scripting (XSS) vulnerability identified in Craft CMS version 4.2.0.1. The vulnerability exists in the JavaScript file src/web/assets/cp/src/js/BaseElementSelectInput.js, specifically in the handling of the label property of elementInfo.label. This improper sanitization or encoding of user-controllable input allows an attacker to inject malicious scripts into the web interface. When a user with appropriate privileges interacts with the affected component, the malicious script can execute in their browser context. The vulnerability requires low privileges (PR:L) and user interaction (UI:R) to be exploited, and it affects the confidentiality and integrity of the affected system by potentially allowing session hijacking, credential theft, or unauthorized actions within the CMS. The CVSS score is 5.4 (medium severity), reflecting a network attack vector with low attack complexity but requiring some privileges and user interaction. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. No known exploits are reported in the wild, and no official patches or vendor project details are provided in the data. The underlying weakness is CWE-79, which is a common XSS vulnerability due to insufficient input validation or output encoding.
Potential Impact
For European organizations using Craft CMS 4.2.0.1, this vulnerability poses a moderate risk. Craft CMS is a popular content management system used by businesses, media companies, and government agencies for managing websites and digital content. Successful exploitation could allow attackers to execute arbitrary scripts in the context of authenticated users, potentially leading to session hijacking, theft of sensitive information, or unauthorized content manipulation. This could result in reputational damage, data breaches, and compliance violations under regulations such as GDPR. Since the vulnerability requires some level of privilege and user interaction, the risk is somewhat mitigated but still significant in environments where multiple users have CMS access. Attackers could target editors or administrators to escalate their access or pivot to other internal systems. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Identify all instances of Craft CMS 4.2.0.1 in their environment and assess exposure. 2) Apply any available vendor patches or updates as soon as they are released; if no official patch exists, consider upgrading to a later, unaffected version of Craft CMS. 3) Implement strict Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting script sources and execution contexts. 4) Conduct a thorough review of user privileges within the CMS to ensure the principle of least privilege is enforced, minimizing the number of users who can trigger the vulnerable code path. 5) Educate CMS users about phishing and social engineering risks to reduce the likelihood of user interaction leading to exploitation. 6) Monitor web server and application logs for suspicious activity related to the vulnerable component, including unusual requests or script injections. 7) Employ web application firewalls (WAF) with rules targeting XSS patterns to provide an additional layer of defense. 8) Regularly audit and sanitize all user-generated content and inputs that may be rendered in the CMS interface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-08-01T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68360472182aa0cae21ef768
Added to database: 5/27/2025, 6:29:06 PM
Last enriched: 7/6/2025, 2:27:38 AM
Last updated: 7/31/2025, 12:15:41 PM
Views: 10
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.