{"id":"CVE-2022-21241","details":"Cross-site scripting vulnerability in CSV+ prior to 0.8.1 allows a remote unauthenticated attacker to inject an arbitrary script or an arbitrary OS command via a specially crafted CSV file that contains HTML a tag.","modified":"2026-04-12T05:17:09.892753Z","published":"2022-02-08T11:15:07.960Z","references":[{"type":"ADVISORY","url":"https://github.com/plusone-masaki/csv-plus/releases/tag/v0.8.1"},{"type":"ADVISORY","url":"https://jvn.jp/en/jp/JVN67396225/index.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/plusone-masaki/csv-plus","events":[{"introduced":"0"},{"fixed":"f153050f21aa26d839749a4906c9fbbe50ddc52c"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"0.8.1"}],"cpe":"cpe:2.3:a:csv\\+_project:csv\\+:*:*:*:*:*:*:*:*","source":["CPE_FIELD","REFERENCES"]}}],"versions":["v0.7.1","v0.7.2","v0.7.5","v0.8.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-21241.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}]}