CVE-2022-4638: collective.contact.widget is vulnerable to cross-site scripting
(updated )
collective.contact.widget is an add-on is part of the collective.contact.* suite. A vulnerability classified as problematic was found in collective.contact.widget up to 1.12. This vulnerability affects the function title of the file src/collective/contact/widget/widgets.py. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 5da36305ca7ed433782be8901c47387406fcda12. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216496.
References
- github.com/advisories/GHSA-5pqf-rvm7-3wgw
- github.com/collective/collective.contact.widget
- github.com/collective/collective.contact.widget/commit/5da36305ca7ed433782be8901c47387406fcda12
- github.com/pypa/advisory-database/tree/main/vulns/collective-contact-widget/PYSEC-2022-42988.yaml
- nvd.nist.gov/vuln/detail/CVE-2022-4638
- vuldb.com/?id.216496
Detect and mitigate CVE-2022-4638 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →