CVE-2022-24710: Cross-site Scripting in Weblate
5.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.52405%
CWE
Published
2/25/2022
Updated
11/19/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Weblate | pip | < 4.11 | 4.11 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing output encoding in 4 key areas: 1) Report generation functions (get_credits/get_counts) failed to escape user-controlled data. 2) Translation form rendering didn't escape language names. 3) Username autocomplete directly injected unescaped strings. The patches explicitly add HTML escaping (via Django's escape() and DOM text node creation) in these specific locations, confirming these were the vulnerable entry points. The CWE-79 classification and commit messages directly correlate to XSS via user/language name inputs in these components.