Home

Description

Inciga Web 2.8.2 contains a client-side cross-site scripting vulnerability that allows remote attackers to inject malicious script codes through the icinga.min.js file. Attackers can exploit the EventListener.handleEvent method to execute arbitrary scripts, potentially leading to session hijacking and non-persistent phishing attacks.

PUBLISHED Reserved 2026-01-11 | Published 2026-02-01 | Updated 2026-02-01 | Assigner VulnCheck




MEDIUM: 4.8CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unaffected

2.8.2
affected

Credits

Vulnerability-Lab [Research Team] finder

References

www.vulnerability-lab.com/get_content.php?id=2273 (Vulnerability Lab Advisory) exploit

icinga.com/ (Product Homepage) product

github.com/Icinga/icingaweb2 (Product Homepage) product

www.vulncheck.com/...-cross-site-scripting-via-eventlistener (VulnCheck Advisory: Inciga Web 2.8.2 Client-Side Cross-Site Scripting via EventListener) third-party-advisory

cve.org (CVE-2022-50942)

nvd.nist.gov (CVE-2022-50942)

Download JSON