{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-39332","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","dateUpdated":"2025-11-03T18:08:03.698Z","dateReserved":"2022-09-02T00:00:00.000Z","datePublished":"2022-11-25T00:00:00.000Z"},"containers":{"cna":{"title":"Cross-site scripting (XSS) in Nextcloud Desktop Client ","providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2022-11-25T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application via user status and information. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue."}],"affected":[{"vendor":"nextcloud","product":"security-advisories","versions":[{"version":"< 3.6.1","status":"affected"}]}],"references":[{"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q9f6-4r6r-h74p"},{"url":"https://github.com/nextcloud/desktop/pull/4972"},{"url":"https://hackerone.com/reports/1707977"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":4.6,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","cweId":"CWE-79"}]}],"source":{"advisory":"GHSA-q9f6-4r6r-h74p","discovery":"UNKNOWN"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q9f6-4r6r-h74p","tags":["x_transferred"]},{"url":"https://github.com/nextcloud/desktop/pull/4972","tags":["x_transferred"]},{"url":"https://hackerone.com/reports/1707977","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/09/msg00018.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T18:08:03.698Z"}},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-22T15:40:55.863713Z","id":"CVE-2022-39332","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-22T16:00:19.395Z"}}]}}