ETAP Safety Manager 1.0.0.32 contains a cross-site scripting vulnerability in the 'action' GET parameter that allows unauthenticated attackers to inject malicious HTML and JavaScript. Attackers can craft specially formed requests to execute arbitrary scripts in victim browser sessions, potentially stealing credentials or performing unauthorized actions.
References
| Link | Resource |
|---|---|
| https://cxsecurity.com/issue/WLB-2022090031 | Third Party Advisory |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/235743 | Third Party Advisory |
| https://packetstormsecurity.com/files/168339/ | Third Party Advisory |
| https://www.etaplighting.com/ | Product US Government Resource |
| https://www.vulncheck.com/advisories/etap-safety-manager-unauthenticated-reflected-cross-site-scripting-via-action-parameter | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5711.php | Third Party Advisory |
| https://cxsecurity.com/issue/WLB-2022090031 | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5711.php | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-30 23:15
Updated : 2026-01-07 22:02
NVD link : CVE-2022-50802
Mitre link : CVE-2022-50802
CVE.ORG link : CVE-2022-50802
JSON object : View
Products Affected
etaplighting
- etap_safety_manager
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
