{"id":"CVE-2022-42225","details":"Jumpserver 2.10.0 \u003c= version \u003c= 2.26.0 contains multiple stored XSS vulnerabilities because of improper filtering of user input, which can execute any javascript under admin's permission.","modified":"2026-03-15T22:00:49.531888Z","published":"2023-05-24T20:15:09.763Z","references":[{"type":"FIX","url":"https://github.com/jumpserver/lina/pull/2264"},{"type":"EVIDENCE","url":"https://gist.github.com/bybit-sec/eb750c1d906c89e97092b29015472738"},{"type":"EVIDENCE","url":"https://github.com/jumpserver/lina/blob/v2.10.0/src/views/settings/SystemMessageSubscription/SelectDialog.vue#L43"},{"type":"EVIDENCE","url":"https://github.com/jumpserver/lina/blob/v2.11.0/src/layout/components/NavHeader/SiteMessages.vue#L40"},{"type":"EVIDENCE","url":"https://github.com/jumpserver/lina/blob/v2.26.0/src/views/tickets/components/Comments.vue#L16"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jumpserver/lina","events":[{"introduced":"0eb8e1fab376c060e6dbbb3f02e7bf2611bcc236"},{"last_affected":"49880f67392b55a53cffc6e3c9988dc3828050fe"}],"database_specific":{"versions":[{"introduced":"2.10.0"},{"last_affected":"2.26.0"}]}}],"versions":["v2.10.0","v2.10.1","v2.11.0","v2.12.0","v2.13.0","v2.14.0","v2.15.0","v2.16.0","v2.17.0","v2.17.1","v2.17.2","v2.19.0","v2.19.1","v2.20.0","v2.21.0","v2.22.0","v2.22.1","v2.22.2","v2.22.3","v2.23.0","v2.24.0","v2.24.1","v2.24.2","v2.25.0","v2.26.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-42225.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}