{"id":"CVE-2022-37044","details":"In Zimbra Collaboration Suite (ZCS) 8.8.15, the URL at /h/search?action accepts parameters called extra, title, and onload that are partially sanitised and lead to reflected XSS that allows executing arbitrary JavaScript on the victim's machine.","modified":"2026-03-14T11:50:31.952172Z","published":"2022-08-12T15:15:16.137Z","references":[{"type":"ADVISORY","url":"https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories"},{"type":"FIX","url":"https://wiki.zimbra.com/wiki/Security_Center"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/zimbra/zm-build","events":[{"introduced":"0"},{"last_affected":"ac6081fa002b1511e926aba37740d2b6c20f3f43"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"8.8.15-NA"}]}}],"versions":["8.7.10","8.7.11","8.7.6","8.7.7","8.7.9","8.8.0.beta1","8.8.10","8.8.11","8.8.11.p3","8.8.12","8.8.15","8.8.2","8.8.3","8.8.4","8.8.6","8.8.7","8.8.8","8.8.9","8.8.9.p1","8.8.9.p3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-37044.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}