// For flags

CVE-2022-1231

XSS via Embedded SVG in SVG Diagram Format in plantuml/plantuml

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

XSS via Embedded SVG in SVG Diagram Format in GitHub repository plantuml/plantuml prior to 1.2022.4. Stored XSS in the context of the diagram embedder. Depending on the actual context, this ranges from stealing secrets to account hijacking or even to code execution for example in desktop applications. Web based applications are the ones most affected. Since the SVG format allows clickable links in diagrams, it is commonly used in plugins for web based projects (like the Confluence plugin, etc. see https://plantuml.com/de/running).

Una vulnerabilidad de tipo XSS por medio de SVG insertado en el formato de diagrama SVG en el repositorio GitHub plantuml/plantuml versiones anteriores a 1.2022.4. Una vulnerabilidad de tipo XSS almacenado en el contexto del insertador de diagramas. Dependiendo del contexto real, esto va desde el robo de secretos hasta el secuestro de cuentas o incluso una ejecución de código, por ejemplo en aplicaciones de escritorio. Las aplicaciones basadas en la web son las más afectadas. Dado que el formato SVG permite enlaces clicables en los diagramas, es comúnmente usado en plugins para proyectos basados en la web (como el plugin de Confluence, etc. vea https://plantuml.com/de/running)

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-04-04 CVE Reserved
  • 2022-04-15 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-08-02 First Exploit
  • 2024-10-11 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Plantuml
Search vendor "Plantuml"
Plantuml
Search vendor "Plantuml" for product "Plantuml"
< 1.2022.4
Search vendor "Plantuml" for product "Plantuml" and version " < 1.2022.4"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
35
Search vendor "Fedoraproject" for product "Fedora" and version "35"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
36
Search vendor "Fedoraproject" for product "Fedora" and version "36"
-
Affected