{"id":"CVE-2022-39824","details":"Server-side JavaScript injection in Appsmith through 1.7.14 allows remote attackers to execute arbitrary JavaScript code from the server via the currentItem property of the list widget, e.g., to perform DoS attacks or achieve an information leak.","aliases":["BIT-appsmith-2022-39824"],"modified":"2026-03-14T11:52:46.817688Z","published":"2022-09-05T03:15:07.627Z","references":[{"type":"ADVISORY","url":"https://github.com/appsmithorg/appsmith/releases"},{"type":"EVIDENCE","url":"https://github.com/FCncdn/Appsmith-Js-Injection-POC"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/appsmithorg/appsmith","events":[{"introduced":"0"},{"last_affected":"6ead20ac5ea296c11c8ec965d0f456e61dd029a0"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.7.14"}]}}],"versions":["v.1.6.23","v.1.6.25","v1.0","v1.0-beta.2","v1.0.0-beta","v1.0.0-beta.1","v1.0.1","v1.0.2","v1.1","v1.2","v1.2.1","v1.2.10","v1.2.11","v1.2.12","v1.2.13","v1.2.14","v1.2.15","v1.2.16","v1.2.17","v1.2.18","v1.2.19","v1.2.2","v1.2.20","v1.2.21","v1.2.22","v1.2.23","v1.2.24","v1.2.25","v1.2.3","v1.2.4","v1.2.5","v1.2.6","v1.2.7","v1.2.8","v1.2.9","v1.3","v1.3.1","v1.3.2","v1.3.3","v1.3.4","v1.3.5","v1.3.5.1","v1.4","v1.4.1","v1.4.10","v1.4.2","v1.4.3","v1.4.4","v1.4.5","v1.4.6","v1.4.7","v1.4.8","v1.4.9","v1.5","v1.5.1","v1.5.10","v1.5.17","v1.5.18","v1.5.19","v1.5.2","v1.5.20","v1.5.21","v1.5.22","v1.5.23","v1.5.24","v1.5.25","v1.5.26","v1.5.27","v1.5.28","v1.5.29","v1.5.3","v1.5.3.1","v1.5.3.2","v1.5.3.3","v1.5.30","v1.5.4","v1.5.5","v1.5.6","v1.5.7","v1.5.8","v1.5.9","v1.6.0","v1.6.1","v1.6.10","v1.6.11","v1.6.12","v1.6.13","v1.6.14","v1.6.15","v1.6.16","v1.6.17","v1.6.18","v1.6.19","v1.6.2","v1.6.20","v1.6.21","v1.6.22","v1.6.3","v1.6.4","v1.6.5","v1.6.6","v1.6.7","v1.6.8","v1.6.9","v1.7.0","v1.7.1","v1.7.10","v1.7.11","v1.7.12","v1.7.13","v1.7.14","v1.7.2","v1.7.3","v1.7.4","v1.7.5","v1.7.6","v1.7.7","v1.7.8","v1.7.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-39824.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:H"}]}