{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T03:27:04.077","vulnerabilities":[{"cve":{"id":"CVE-2022-23466","sourceIdentifier":"security-advisories@github.com","published":"2022-12-06T18:15:09.997","lastModified":"2024-11-21T06:48:37.047","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"teler is an real-time intrusion detection and threat alert dashboard. teler prior to version 2.0.0-rc.4 is vulnerable to DOM-based cross-site scripting (XSS) in the teler dashboard. When teler requests messages from the event stream on the `/events` endpoint, the log data displayed on the dashboard are not sanitized. This only affects authenticated users and can only be exploited based on detected threats if the log contains a DOM scripting payload. This vulnerability has been fixed on version `v2.0.0-rc.4`. Users are advised to upgrade. There are no known workarounds for this vulnerability."},{"lang":"es","value":"teler es un panel de alerta de amenazas y detección de intrusiones en tiempo real. Teler anterior a la versión 2.0.0-rc.4 es vulnerable a Cross-Site Scripting (XSS) basadas en DOM en el panel de Teler. Cuando Teler solicita mensajes del flujo de eventos en el endpoint `/events`, los datos de registro que se muestran en el panel no se sanitizan. Esto solo afecta a los usuarios autenticados y solo puede explotarse en función de las amenazas detectadas si el registro contiene un payload de scripts DOM. Esta vulnerabilidad se ha solucionado en la versión `v2.0.0-rc.4`. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:teler_project:teler:2.0.0:dev:*:*:*:*:*:*","matchCriteriaId":"B8D05462-0FF8-4C55-8D74-32792BCFE605"},{"vulnerable":true,"criteria":"cpe:2.3:a:teler_project:teler:2.0.0:rc:*:*:*:*:*:*","matchCriteriaId":"3C0CCA04-45FC-4F70-8370-D9996B6689B0"},{"vulnerable":true,"criteria":"cpe:2.3:a:teler_project:teler:2.0.0:rc2:*:*:*:*:*:*","matchCriteriaId":"9AFDB28D-E9A2-4255-BE1E-2B5A0EBAD9F5"},{"vulnerable":true,"criteria":"cpe:2.3:a:teler_project:teler:2.0.0:rc3:*:*:*:*:*:*","matchCriteriaId":"333A02F9-5BA3-45F4-BB8B-FC84F49DF75B"}]}]}],"references":[{"url":"https://github.com/kitabisa/teler/commit/20f59eda2420ac64e29f199a61230a0abc875e8e","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/kitabisa/teler/security/advisories/GHSA-xr7p-8q82-878q","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/kitabisa/teler/commit/20f59eda2420ac64e29f199a61230a0abc875e8e","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/kitabisa/teler/security/advisories/GHSA-xr7p-8q82-878q","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]}]}}]}