Please update to Apache Sling Engine >= 2.14.0 and enable the "Check Content-Type overrides" configuration option.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1351 | The SlingRequestDispatcher doesn't correctly implement the RequestDispatcher API resulting in a generic type of include-based cross-site scripting issues on the Apache Sling level. The vulnerability is exploitable by an attacker that is able to include a resource with specific content-type and control the include path (i.e. writing content). The impact of a successful attack is privilege escalation to administrative power. Please update to Apache Sling Engine >= 2.14.0 and enable the "Check Content-Type overrides" configuration option. |
Github GHSA |
GHSA-mg46-f9h5-g27x | Apache Sling Engine vulnerable to cross-site scripting (XSS) that can lead to privilege escalation |
Fri, 13 Jun 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache apache Sling Engine
|
|
| CPEs | cpe:2.3:a:apache:apache_sling_engine:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache apache Sling Engine
|
Fri, 23 May 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:sling:2.13.0:*:*:*:*:*:*:* |
Thu, 17 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-10-17T20:31:19.485Z
Reserved: 2022-11-09T09:29:43.945Z
Link: CVE-2022-45064
Updated: 2024-08-03T14:01:31.530Z
Status : Analyzed
Published: 2023-04-13T11:15:06.737
Modified: 2025-06-13T17:55:57.933
Link: CVE-2022-45064
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA