{"id":"CVE-2022-38256","details":"TastyIgniter v3.5.0 was discovered to contain a cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload.","modified":"2026-04-12T05:40:12.793930Z","published":"2022-09-08T18:15:08.567Z","references":[{"type":"ADVISORY","url":"https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2022-005"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/tastyigniter/tastyigniter","events":[{"introduced":"0"},{"last_affected":"55351d3411891dfce217ca03f11e43b7a30714bb"}],"database_specific":{"cpe":"cpe:2.3:a:tastyigniter:tastyigniter:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"3.5.0"}],"source":"CPE_FIELD"}}],"versions":["2.0.0","2.1.0","2.1.1","v1.0-beta","v1.1-beta","v1.2-beta","v1.2.1-beta","v1.3-beta","v1.4.0-beta","v1.4.1-beta","v1.4.1.0-beta","v1.4.2-beta","v3.0.4","v3.0.4-beta","v3.0.4-beta.10","v3.0.4-beta.11","v3.0.4-beta.12","v3.0.4-beta.13","v3.0.4-beta.14","v3.0.4-beta.15","v3.0.4-beta.16","v3.0.4-beta.17","v3.0.4-beta.18","v3.0.4-beta.19","v3.0.4-beta.2","v3.0.4-beta.20","v3.0.4-beta.20.1","v3.0.4-beta.21","v3.0.4-beta.22","v3.0.4-beta.22.1","v3.0.4-beta.22.2","v3.0.4-beta.22.3","v3.0.4-beta.22.4","v3.0.4-beta.23","v3.0.4-beta.23.1","v3.0.4-beta.23.2","v3.0.4-beta.24","v3.0.4-beta.24.1","v3.0.4-beta.24.2","v3.0.4-beta.24.3","v3.0.4-beta.24.4","v3.0.4-beta.25","v3.0.4-beta.25.2","v3.0.4-beta.26","v3.0.4-beta.27","v3.0.4-beta.28","v3.0.4-beta.3","v3.0.4-beta.4","v3.0.4-beta.5","v3.0.4-beta.6","v3.0.4-beta.7","v3.0.4-beta.8","v3.0.4-beta.9","v3.0.4-beta.9.1","v3.0.5","v3.0.6","v3.0.7","v3.1.0","v3.1.0-rc.1","v3.1.1","v3.1.2","v3.2.0","v3.2.1","v3.2.2","v3.3.0","v3.3.1","v3.3.2","v3.4.0","v3.4.1","v3.5.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-38256.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}