CWE
79
Advisory Published
Updated

CVE-2022-24566: XSS

First published: Wed Feb 23 2022(Updated: )

In Checkmk <=2.0.0p19 fixed in 2.0.0p20 and Checkmk <=1.6.0p27 fixed in 1.6.0p28, the title of a Predefined condition is not properly escaped when shown as condition, which can result in Cross Site Scripting (XSS).

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Tribe29 Checkmk=1.6.0
Tribe29 Checkmk=1.6.0-b1
Tribe29 Checkmk=1.6.0-b10
Tribe29 Checkmk=1.6.0-b12
Tribe29 Checkmk=1.6.0-b3
Tribe29 Checkmk=1.6.0-b4
Tribe29 Checkmk=1.6.0-b5
Tribe29 Checkmk=1.6.0-b9
Tribe29 Checkmk=1.6.0-p1
Tribe29 Checkmk=1.6.0-p10
Tribe29 Checkmk=1.6.0-p11
Tribe29 Checkmk=1.6.0-p12
Tribe29 Checkmk=1.6.0-p13
Tribe29 Checkmk=1.6.0-p14
Tribe29 Checkmk=1.6.0-p15
Tribe29 Checkmk=1.6.0-p16
Tribe29 Checkmk=1.6.0-p19
Tribe29 Checkmk=1.6.0-p2
Tribe29 Checkmk=1.6.0-p20
Tribe29 Checkmk=1.6.0-p21
Tribe29 Checkmk=1.6.0-p22
Tribe29 Checkmk=1.6.0-p23
Tribe29 Checkmk=1.6.0-p24
Tribe29 Checkmk=1.6.0-p25
Tribe29 Checkmk=1.6.0-p26
Tribe29 Checkmk=1.6.0-p27
Tribe29 Checkmk=2.0.0
Tribe29 Checkmk=2.0.0-b1
Tribe29 Checkmk=2.0.0-b2
Tribe29 Checkmk=2.0.0-b3
Tribe29 Checkmk=2.0.0-b4
Tribe29 Checkmk=2.0.0-b5
Tribe29 Checkmk=2.0.0-b6
Tribe29 Checkmk=2.0.0-b7
Tribe29 Checkmk=2.0.0-b8
Tribe29 Checkmk=2.0.0-i1
Tribe29 Checkmk=2.0.0-p1
Tribe29 Checkmk=2.0.0-p10
Tribe29 Checkmk=2.0.0-p11
Tribe29 Checkmk=2.0.0-p12
Tribe29 Checkmk=2.0.0-p13
Tribe29 Checkmk=2.0.0-p14
Tribe29 Checkmk=2.0.0-p15
Tribe29 Checkmk=2.0.0-p16
Tribe29 Checkmk=2.0.0-p17
Tribe29 Checkmk=2.0.0-p18
Tribe29 Checkmk=2.0.0-p19
Checkmk Checkmk=1.6.0
Checkmk Checkmk=1.6.0-b1
Checkmk Checkmk=1.6.0-b10
Checkmk Checkmk=1.6.0-b12
Checkmk Checkmk=1.6.0-b3
Checkmk Checkmk=1.6.0-b4
Checkmk Checkmk=1.6.0-b5
Checkmk Checkmk=1.6.0-b9
Checkmk Checkmk=1.6.0-p1
Checkmk Checkmk=1.6.0-p10
Checkmk Checkmk=1.6.0-p11
Checkmk Checkmk=1.6.0-p12
Checkmk Checkmk=1.6.0-p13
Checkmk Checkmk=1.6.0-p14
Checkmk Checkmk=1.6.0-p15
Checkmk Checkmk=1.6.0-p16
Checkmk Checkmk=1.6.0-p19
Checkmk Checkmk=1.6.0-p2
Checkmk Checkmk=1.6.0-p20
Checkmk Checkmk=1.6.0-p21
Checkmk Checkmk=1.6.0-p22
Checkmk Checkmk=1.6.0-p23
Checkmk Checkmk=1.6.0-p24
Checkmk Checkmk=1.6.0-p25
Checkmk Checkmk=1.6.0-p26
Checkmk Checkmk=1.6.0-p27
Checkmk Checkmk=2.0.0
Checkmk Checkmk=2.0.0-b1
Checkmk Checkmk=2.0.0-b2
Checkmk Checkmk=2.0.0-b3
Checkmk Checkmk=2.0.0-b4
Checkmk Checkmk=2.0.0-b5
Checkmk Checkmk=2.0.0-b6
Checkmk Checkmk=2.0.0-b7
Checkmk Checkmk=2.0.0-b8
Checkmk Checkmk=2.0.0-i1
Checkmk Checkmk=2.0.0-p1
Checkmk Checkmk=2.0.0-p10
Checkmk Checkmk=2.0.0-p11
Checkmk Checkmk=2.0.0-p12
Checkmk Checkmk=2.0.0-p13
Checkmk Checkmk=2.0.0-p14
Checkmk Checkmk=2.0.0-p15
Checkmk Checkmk=2.0.0-p16
Checkmk Checkmk=2.0.0-p17
Checkmk Checkmk=2.0.0-p18
Checkmk Checkmk=2.0.0-p19

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2022-24566?

    CVE-2022-24566 is a vulnerability in Checkmk <=2.0.0p19 fixed in 2.0.0p20 and Checkmk <=1.6.0p27 fixed in 1.6.0p28 that allows for Cross Site Scripting (XSS) through improper escaping of a Predefined condition's title.

  • How severe is CVE-2022-24566?

    CVE-2022-24566 has a severity rating of medium with a CVSS score of 5.4 out of 10.

  • What software versions are affected by CVE-2022-24566?

    CVE-2022-24566 affects Checkmk versions 1.6.0 and 2.0.0, specifically versions up to 1.6.0p19 and 2.0.0p19 respectively.

  • How can I fix CVE-2022-24566?

    To fix CVE-2022-24566, it is recommended to update Checkmk to version 2.0.0p20 or higher for Checkmk 2.0.0, and version 1.6.0p28 or higher for Checkmk 1.6.0.

  • Where can I find more information about CVE-2022-24566?

    You can find more information about CVE-2022-24566 on the official Checkmk website at the following link: [CVE-2022-24566](https://checkmk.com/werk/13717).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203