{"id":"CVE-2022-3562","summary":"Cross-site Scripting (XSS) - Stored in librenms/librenms","details":"Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.10.0.","aliases":["GHSA-5h77-4245-pg5p"],"modified":"2026-04-10T04:49:04.107217Z","published":"2022-11-20T00:00:00Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/3xxx/CVE-2022-3562.json","cwe_ids":["CWE-79"],"cna_assigner":"@huntrdev"},"references":[{"type":"WEB","url":"https://huntr.dev/bounties/bb9f76db-1314-44ae-9ccc-2b69679aa657"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/3xxx/CVE-2022-3562.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3562"},{"type":"FIX","url":"https://github.com/librenms/librenms/commit/43cb72549d90e338f902b359a83c23d3cb5a2645"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/librenms/librenms","events":[{"introduced":"0"},{"fixed":"ddf24809d48485dfdaf70cab1d98eec582674e76"}]}],"versions":["0.1","1.19","1.20","1.21","1.25","1.26","1.27","1.28","1.31.01","1.31.02","1.31.03","1.32","1.33","1.35","1.36","1.37","1.38","1.39","1.40","1.41","1.42","1.42.01","1.43","1.44","1.45","1.46","1.47","1.48","1.48.1","1.49","1.50","1.51","1.52","1.53","1.53.1","1.54","1.55","1.56","1.57","1.58","1.58.1","1.59","1.60","1.61","1.62","1.63","1.64","1.64.1","1.65","1.66","1.67","1.68","1.69","1.70.0","1.70.1","201505","201506","201507","201508","201509","201510","201511","201512","201601","201602","201603","201604","201605","201606","201607","201608","20160828","201609","21.1.0","21.10.0","21.11.0","21.12.0","21.12.1","21.2.0","21.3.0","21.4.0","21.5.0","21.5.1","21.6.0","21.7.0","21.8.0","21.9.0","22.1.0","22.2.0","22.2.1","22.3.0","22.4.0","22.5.0","22.6.0","22.7.0","22.8.0","22.9.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-3562.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L"}]}