CVE-2022-30349:
Cross site scripting in SSCMS
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.4388%
CWE
Published
6/3/2022
Updated
1/27/2023
KEV Status
No
Technology
C#
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
SSCMS | nuget | = 6.15.51 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability manifests in the modalRelatedFieldItemEdit.aspx
endpoint where user-supplied input (TbItemName
parameter) is directly reflected in the response without proper HTML encoding. The provided exploit demonstrates that submitting a crafted SVG payload in TbItemName
parameter triggers XSS when rendered. This indicates the backend processing function (likely Page_Load()
in ASP.NET Web Forms architecture) fails to sanitize user input before incorporating it into the page output. The combination of the vulnerable endpoint pattern and the demonstrated exploit mechanism strongly points to the field editor's form handling code as the vulnerable component.