First published: Fri Jun 24 2022(Updated: )
BigBlueButton version 2.4.7 (or earlier) is vulnerable to stored Cross-Site Scripting (XSS) in the private chat functionality. A threat actor could inject JavaScript payload in his/her username. The payload gets executed in the browser of the victim each time the attacker sends a private message to the victim or when notification about the attacker leaving room is displayed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bigbluebutton Bigbluebutton | <=2.4.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-27238 is medium with a CVSS score of 5.4.
BigBlueButton version 2.4.7 is vulnerable to stored Cross-Site Scripting (XSS) in the private chat functionality.
An attacker can exploit CVE-2022-27238 by injecting JavaScript payload in their username and sending a private message to the victim, executing the payload in the victim's browser.
Yes, BigBlueButton version 2.4.7 (or earlier) is the only affected version.
To fix CVE-2022-27238, it is recommended to update BigBlueButton to a version later than 2.4.7 that includes the security patch.