
Cloud Vulnerability DB
A community-led vulnerabilities database
Cross-site scripting vulnerability in BookStack versions prior to v22.09 allows a remote authenticated attacker to inject an arbitrary script. The vulnerability was discovered and disclosed in September 2022, affecting all versions of BookStack prior to v22.09. (JVN Report, NVD)
The vulnerability is classified as a Cross-Site Scripting (CWE-79) issue that allows execution of arbitrary scripts on the web browser of users accessing the site through the API. The vulnerability has a CVSS v3.0 base score of 5.4 (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N), indicating moderate severity with network attack vector, low attack complexity, and requiring low privileges and user interaction. (JVN Report)
A successful exploitation of this vulnerability could allow an attacker to execute arbitrary scripts in the context of the user's browser when accessing content via the BookStack API. This could potentially lead to unauthorized access to user data and compromise of user sessions. (JVN Report)
The primary mitigation is to update BookStack to version v22.09 or later. For cases where BookStack content is used externally via its API, developers should implement additional security measures such as Content Security Policy (CSP) rules or completely disable JavaScript execution. The documentation also recommends reviewing and implementing proper security controls when using BookStack content externally. (BookStack Security, BookStack Release)
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."