{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T17:22:58.906","vulnerabilities":[{"cve":{"id":"CVE-2022-1457","sourceIdentifier":"security@huntr.dev","published":"2022-04-25T10:15:09.530","lastModified":"2024-11-21T06:40:45.633","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Store XSS in title parameter executing at EditUser Page & EditProducto page in GitHub repository neorazorx/facturascripts prior to 2022.04. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or install malware on the user's machine. Attackers can masquerade as authorized users via session cookies, allowing them to perform any action allowed by the user account."},{"lang":"es","value":"Una vulnerabilidad de tipo XSS almacenado en el parámetro title que es ejecutado en la página EditUser y EditProducto en el repositorio de GitHub neorazorx/facturascripts anterior a 2022.04. Los ataques de tipo cross-site scripting pueden tener consecuencias devastadoras. El código inyectado en una aplicación vulnerable puede exfiltrar datos o instalar malware en la máquina del usuario. Los atacantes pueden hacerse pasar por usuarios autorizados por medio de cookies de sesión, permitiéndoles llevar a cabo cualquier acción permitida por la cuenta de usuario"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":9.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":6.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:facturascripts:facturascripts:*:*:*:*:*:*:*:*","versionEndExcluding":"2022.04","matchCriteriaId":"BFCD1771-5998-4B26-AB80-E01F9BA29B14"}]}]}],"references":[{"url":"https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df","source":"security@huntr.dev","tags":["Patch","Third Party Advisory"]},{"url":"https://huntr.dev/bounties/8c80caa0-dc89-43f2-8f5f-db02d2669046","source":"security@huntr.dev","tags":["Exploit","Patch","Third Party Advisory"]},{"url":"https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://huntr.dev/bounties/8c80caa0-dc89-43f2-8f5f-db02d2669046","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Third Party Advisory"]}]}}]}