
Cloud Vulnerability DB
A community-led vulnerabilities database
A stored Cross-Site Scripting (XSS) vulnerability has been identified in iris-web, affecting multiple locations in versions prior to v2.4.0. The vulnerability was discovered in February 2024 and affects the iris-web platform, which is a web collaborative platform designed for incident responders to share technical details during investigations (GitHub Advisory).
The vulnerability is classified as a stored XSS issue, specifically related to improper neutralization of alternate XSS syntax (CWE-87). It has been assigned a CVSS v3.1 base score of 5.4 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, indicating network accessibility, low attack complexity, and required user interaction (NVD).
If exploited, this vulnerability could allow an attacker to inject malicious scripts into the application, which could then be executed when a user visits the affected locations. This could potentially lead to unauthorized access, data theft, or other related malicious activities (GitHub Advisory).
The vulnerability has been fixed in version v2.4.0 of iris-web. No workarounds are available, and it is recommended to upgrade to the latest version of the software (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."