Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-53400 | In "Gin-Vue-Admin", versions v2.5.1 through v2.5.3beta are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the 'Normal Upload' functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin’s cookie leading to account takeover. |
Wed, 14 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Mend
Published:
Updated: 2025-05-14T15:19:24.105Z
Reserved: 2022-05-31T00:00:00.000Z
Link: CVE-2022-32177
Updated: 2024-08-03T07:32:55.999Z
Status : Modified
Published: 2022-10-14T07:15:09.057
Modified: 2025-05-14T16:15:19.040
Link: CVE-2022-32177
No data.
OpenCVE Enrichment
No data.
EUVD