First published: Thu Dec 15 2022(Updated: )
A cross-site scripting (XSS) vulnerability in Expense Tracker 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Chat text field.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oretnom23 Expense Tracker | =1.0 | |
=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-45033 is medium with a CVSS score of 5.4.
CVE-2022-45033 is a cross-site scripting (XSS) vulnerability in Expense Tracker 1.0 that allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Chat text field.
The CVE-2022-45033 vulnerability can be exploited by injecting a crafted payload into the Chat text field of Expense Tracker 1.0 to execute arbitrary web scripts or HTML.
At the moment, there is no specific fix available for CVE-2022-45033. It is recommended to keep the software up to date and apply any patches or security updates provided by the vendor.
The Common Weakness Enumeration (CWE) ID for CVE-2022-45033 is CWE-79, which refers to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').