First published: Tue Jul 12 2022(Updated: )
A vulnerability has been identified in Mendix Applications using Mendix 9 (All versions >= V9.11 < V9.15), Mendix Applications using Mendix 9 (V9.12) (All versions < V9.12.3). An expression injection vulnerability was discovered in the Workflow subsystem of Mendix Runtime, that can affect the running applications. The vulnerability could allow a malicious user to leak sensitive information in a certain configuration.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mendix | >=9.11.0<9.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34466 is a vulnerability identified in Mendix Applications using Mendix 9 (All versions >= V9.11 < V9.15) and Mendix Applications using Mendix 9 (V9.12) (All versions < V9.12.3).
The severity of CVE-2022-34466 is medium.
The affected software by CVE-2022-34466 is Mendix Applications using Mendix 9 (All versions >= V9.11 < V9.15) and Mendix Applications using Mendix 9 (V9.12) (All versions < V9.12.3).
The CWE of CVE-2022-34466 is CWE-917 and CWE-74.
To fix CVE-2022-34466, it is recommended to update the affected Mendix Applications to versions V9.12.3 or V9.15.0 depending on the specific version.