CVE-2022-40365:
ouqiang gocron Cross-site scripting vulnerability
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.59052%
CWE
Published
9/15/2022
Updated
1/28/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/ouqiang/gocron | go | <= 1.5.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability is explicitly tied to scope.row.hostname
in list.vue
's template rendering. XSS occurs when unescaped user-controlled input (hostname
) is rendered in the DOM. Vue's default {{ }} syntax escapes content, but the presence of this vulnerability suggests unsafe rendering methods like v-html
were used. The GitHub issue #362 confirms the exact location (line 91) where hostname
is parsed as HTML, indicating a lack of output encoding in the template.