{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T01:48:13.921","vulnerabilities":[{"cve":{"id":"CVE-2022-30578","sourceIdentifier":"security@tibco.com","published":"2022-09-21T18:15:10.040","lastModified":"2025-05-28T14:15:28.120","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Web Server component of TIBCO Software Inc.'s TIBCO EBX Add-ons contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO EBX Add-ons: versions 5.4.1 and below."},{"lang":"es","value":"El componente Web Server de los complementos TIBCO EBX de TIBCO Software Inc. contiene una vulnerabilidad fácilmente explotable que permite a un atacante poco privilegiado y acceso a la red ejecutar un ataque de tipo Cross Site Scripting (XSS) Almacenado en el sistema afectado. Un ataque con éxito usando esta vulnerabilidad requiere la interacción humana de una persona diferente del atacante. Las versiones afectadas son los complementos TIBCO EBX de TIBCO Software Inc.: versiones 5.4.1 y posteriores"}],"metrics":{"cvssMetricV31":[{"source":"security@tibco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H","baseScore":9.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:ebx_add-ons:*:*:*:*:*:*:*:*","versionEndExcluding":"5.4.2","matchCriteriaId":"58BA2B84-B01A-492A-AAF6-3632DE62D8FE"}]}]}],"references":[{"url":"https://www.tibco.com/services/support/advisories","source":"security@tibco.com","tags":["Vendor Advisory"]},{"url":"https://www.tibco.com/support/advisories/2022/09/tibco-security-advisory-sep-21-2022-ebx-add-ons-cve-2022-30578","source":"security@tibco.com","tags":["Vendor Advisory"]},{"url":"https://www.tibco.com/support/advisories/2022/09/tibco-security-advisory-september-21-2022-tibco-ebx-add-ons-cve-2022","source":"security@tibco.com","tags":["Vendor Advisory"]},{"url":"https://www.tibco.com/services/support/advisories","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.tibco.com/support/advisories/2022/09/tibco-security-advisory-sep-21-2022-ebx-add-ons-cve-2022-30578","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.tibco.com/support/advisories/2022/09/tibco-security-advisory-september-21-2022-tibco-ebx-add-ons-cve-2022","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}