Headline
CVE-2022-31136
Bookwyrm is an open source social reading and reviewing program. Versions of Bookwyrm prior to 0.4.1 did not properly sanitize html being rendered to users. Unprivileged users are able to inject scripts into user profiles, book descriptions, and statuses. These vulnerabilities may be exploited as cross site scripting attacks on users viewing these fields. Users are advised to upgrade to version 0.4.1. There are no known workarounds for this issue.
Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) in BookWyrm
Package
BookWyrm (Installed application)
Affected versions
< v0.4.1
Description
Impact
Unprivileged users are able to inject scripts into user profiles, book descriptions, and statuses.
Patches
Patched in version v0.4.1
Workarounds
Limit registration to only trusted users.
References
XSS-OSWAP
For more information
If you have any questions or comments about this advisory:
- Open an issue in BookWyrm
- Email us at [email protected]