{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T11:58:50.032","vulnerabilities":[{"cve":{"id":"CVE-2022-1514","sourceIdentifier":"security@huntr.dev","published":"2022-04-28T16:15:08.060","lastModified":"2024-11-21T06:40:52.687","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Stored XSS via upload plugin functionality in zip format in GitHub repository neorazorx/facturascripts prior to 2022.06. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or install malware on the user's machine. Attackers can masquerade as authorized users via session cookies, allowing them to perform any action allowed by the user account."},{"lang":"es","value":"Una vulnerabilidad de tipo XSS almacenado por medio de la funcionalidad upload plugin en formato zip en el repositorio de GitHub neorazorx/facturascripts versiones anteriores a 2022.06. Los ataques de tipo cross-site scripting pueden tener consecuencias devastadoras. El código inyectado en una aplicación vulnerable puede exfiltrar datos o instalar malware en la máquina del usuario. Los atacantes pueden hacerse pasar por usuarios autorizados por medio de cookies de sesión, permitiéndoles llevar a cabo cualquier acción permitida por la cuenta de usuario"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":9.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":6.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:facturascripts:facturascripts:*:*:*:*:*:*:*:*","versionEndExcluding":"2022.06","matchCriteriaId":"4D19608D-8D38-4581-89F0-4C4318197848"}]}]}],"references":[{"url":"https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e","source":"security@huntr.dev","tags":["Patch","Third Party Advisory"]},{"url":"https://huntr.dev/bounties/4ae2a917-843a-4ae4-8197-8425a596761c","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://huntr.dev/bounties/4ae2a917-843a-4ae4-8197-8425a596761c","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}