CVE-2022-32172: Zinc Cross-site Scripting vulnerability
5.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.62615%
CWE
Published
7/6/2023
Updated
7/6/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/zincsearch/zincsearch | go | >= 0.1.9, < 0.3.2 | 0.3.2 |
| github.com/zinclabs/zinc | go | >= 0.1.9, < 0.3.2 | 0.3.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The commit diff shows the vulnerability was patched by adding HTML escaping to props.row.name in Template.vue's deletion dialog. The unescaped insertion of user-controlled template names into HTML markup via the confirmation message (props.row.name) directly enabled XSS. The User.vue change was a related defensive fix but not the primary vulnerability vector described in CVE-2022-32172, which specifically references template deletion as the trigger.