CVE-2022-3225

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to execute arbitrary code within the Budibase application, potentially leading to unauthorized access or data manipulation. It requires the attacker to have some level of access to the system where Budibase is running, making it important for users to update to version 1.3.20 or later to mitigate the risk.

Technical Description

Improper Control of Dynamically-Managed Code Resources in GitHub repository budibase/budibase prior to 1.3.20.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
Confidentiality ImpactNone
Integrity ImpactHigh
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References