{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T17:09:28.839","vulnerabilities":[{"cve":{"id":"CVE-2022-50787","sourceIdentifier":"disclosure@vulncheck.com","published":"2025-12-30T23:15:45.223","lastModified":"2026-01-13T15:12:24.483","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x contains an unauthenticated stored cross-site scripting vulnerability in the username parameter that allows attackers to inject malicious scripts. Attackers can exploit the unvalidated username input to execute arbitrary HTML and JavaScript code in victim browser sessions without authentication."},{"lang":"es","value":"SOUND4 IMPACT/FIRST/PULSE/Eco versiones 2.x contiene una vulnerabilidad de cross-site scripting almacenado no autenticada en el parámetro de nombre de usuario que permite a los atacantes inyectar scripts maliciosos. Los atacantes pueden explotar la entrada de nombre de usuario no validada para ejecutar código HTML y JavaScript arbitrario en las sesiones del navegador de la víctima sin autenticación."}],"metrics":{"cvssMetricV40":[{"source":"disclosure@vulncheck.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"PASSIVE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"disclosure@vulncheck.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":2.7}]},"weaknesses":[{"source":"disclosure@vulncheck.com","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:impact_firmware:2.15:*:*:*:*:*:*:*","matchCriteriaId":"33C347FE-DA7B-4137-87B8-E6A8AF4D307F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:impact:2.0:*:*:*:*:*:*:*","matchCriteriaId":"0A735654-A166-4B56-BF4D-F165B7E11043"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:impact_firmware:1.69:*:*:*:*:*:*:*","matchCriteriaId":"5C4CF02A-8CF1-46FF-9EC0-FF779D60B6EA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:impact:1.0:*:*:*:*:*:*:*","matchCriteriaId":"EC9BD81B-573A-4DA7-AC47-6C8AF1B6B18F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:pulse_firmware:2.15:*:*:*:*:*:*:*","matchCriteriaId":"18E34118-F11B-4BF2-BE23-7DAE0A6790FB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:pulse:2.0:*:*:*:*:*:*:*","matchCriteriaId":"C46BF88C-955C-4F9E-B782-1EADA068F19D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:pulse_firmware:1.69:*:*:*:*:*:*:*","matchCriteriaId":"E0699DEA-9CDA-4BB4-8FA3-6A6FADE1A61E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:pulse:1.0:*:*:*:*:*:*:*","matchCriteriaId":"051868AE-E364-4CB3-B927-42B4E0C19D01"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:first_firmware:2.15:*:*:*:*:*:*:*","matchCriteriaId":"FBDECDEC-C5A2-4B0D-B3E0-58CCCC804BCF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:first:2.0:*:*:*:*:*:*:*","matchCriteriaId":"4EF10967-A7DC-4DF0-94BE-935FFC1888D6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:first_firmware:1.69:*:*:*:*:*:*:*","matchCriteriaId":"713CC97E-CC0A-41B8-B8CA-EAD8F774F77C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:first:1.0:*:*:*:*:*:*:*","matchCriteriaId":"C4034A51-85E1-44E7-973B-7BFFFB083832"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:impact_eco_firmware:1.16:*:*:*:*:*:*:*","matchCriteriaId":"5ED99BE5-4598-4D5C-B0F0-3BE6E5B05C10"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:impact_eco:-:*:*:*:*:*:*:*","matchCriteriaId":"B4B0A611-C50E-4397-ACDF-8D090D4AFC88"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:pulse_eco_firmware:1.16:*:*:*:*:*:*:*","matchCriteriaId":"9A3C132F-ACCE-4618-8EC2-31624571F0BF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:pulse_eco:-:*:*:*:*:*:*:*","matchCriteriaId":"71E155FD-162E-4EA9-9BD9-89384B3AD175"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:big_voice4_firmware:1.2:*:*:*:*:*:*:*","matchCriteriaId":"DFF4C955-E4AF-4A3A-89F9-481CE5DB7BF1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:big_voice4:-:*:*:*:*:*:*:*","matchCriteriaId":"404A1397-CD88-4CB5-99B9-B84F3359E13F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:big_voice2_firmware:1.30:*:*:*:*:*:*:*","matchCriteriaId":"45230C2E-D043-45F5-869F-FEB0A3AEB5DE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:big_voice2:-:*:*:*:*:*:*:*","matchCriteriaId":"8C68C1DC-EC1C-445B-B78C-6E4B64BB5DB0"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:wm2_firmware:1.11:*:*:*:*:*:*:*","matchCriteriaId":"05D5318D-BD08-4D8E-9D94-4D0FD0C0023E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:wm2:-:*:*:*:*:*:*:*","matchCriteriaId":"ED8E14DD-2C04-4080-AAE9-6D770436AC6C"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sound4:stream_extension:2.4.29:*:*:*:*:*:*:*","matchCriteriaId":"DFFD1447-69A1-4FA0-B285-6F16D9113558"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/247920","source":"disclosure@vulncheck.com","tags":["Third Party Advisory"]},{"url":"https://packetstormsecurity.com/files/170258/SOUND4-IMPACT-FIRST-PULSE-Eco-2.x-Persistent-Cross-Site-Scripting.html","source":"disclosure@vulncheck.com","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"https://www.sound4.com/","source":"disclosure@vulncheck.com","tags":["Product"]},{"url":"https://www.vulncheck.com/advisories/sound-impactfirstpulseeco-x-unauthenticated-stored-cross-site-scripting","source":"disclosure@vulncheck.com","tags":["Third Party Advisory"]},{"url":"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5731.php","source":"disclosure@vulncheck.com","tags":["Exploit","Third Party Advisory"]}]}}]}