CVE-2022-50963
Received Received - Intake
Reflected XSS in uBidAuction 2.0.1 Filter Parameters

Publication date: 2026-05-10

Last updated on: 2026-05-10

Assigner: VulnCheck

Description
uBidAuction 2.0.1 contains a reflected cross-site scripting vulnerability in the auctions/myAuctions/status/active module. The date_created, date_from, date_to, and created_at parameters in the filter functionality are not properly sanitized, allowing remote attackers to inject malicious scripts via crafted GET requests that execute in victims' browsers.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-10
Last Modified
2026-05-10
Generated
2026-05-10
AI Q&A
2026-05-10
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2022-50963 is a reflected cross-site scripting (XSS) vulnerability found in uBidAuction version 2.0.1, specifically in the auctions/myAuctions/status/active module.

The vulnerability occurs because the parameters date_created, date_from, date_to, and created_at in the filter functionality are not properly sanitized. This allows remote attackers to inject malicious scripts via crafted GET requests.

When a victim accesses a manipulated URL containing these malicious scripts, the scripts execute in their browser, potentially leading to various attacks.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The CVE-2022-50963 vulnerability is a reflected cross-site scripting (XSS) flaw that allows attackers to inject malicious scripts into the application, potentially leading to session hijacking, phishing attacks, and manipulation of application modules.

While the provided information does not explicitly mention compliance with standards such as GDPR or HIPAA, vulnerabilities like XSS can impact compliance by exposing user data to unauthorized access or manipulation, which may violate data protection and privacy requirements.

Organizations using the affected uBidAuction 2.0.1 version should consider this vulnerability a risk to the confidentiality and integrity of user data, potentially affecting compliance with regulations that mandate secure handling of personal information.


How can this vulnerability impact me? :

Exploitation of this vulnerability can lead to several security issues including session hijacking, phishing attacks, external redirects, and manipulation of application modules.

Because the attack vector is a crafted GET request that requires no authentication or privileges and low user interaction, attackers can easily exploit this vulnerability remotely.

Successful attacks could compromise user data, allow unauthorized actions within the application, and damage user trust.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The vulnerability can be detected by monitoring HTTP GET requests to the auctions/myAuctions/status/active module, specifically looking for suspicious or crafted inputs in the date_created, date_from, date_to, and created_at parameters.

Detection commands could include using network monitoring tools or web server logs to filter requests containing script tags or unusual characters in these parameters.

  • Example using grep on web server logs: grep -iE "(date_created|date_from|date_to|created_at)=.*<script" access.log
  • Using curl to test the endpoint with a crafted payload: curl "http://target/auctions/myAuctions/status/active?date_created=<script>alert(1)</script>" -v

These commands help identify if the application reflects unsanitized input back in the response, indicating the presence of the reflected XSS vulnerability.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying the vendor-provided patch for uBidAuction version 2.0.1 that addresses the reflected XSS vulnerability.

If a patch is not immediately available, implement input validation and output encoding on the date_created, date_from, date_to, and created_at parameters to prevent script injection.

Additionally, consider deploying Web Application Firewall (WAF) rules to block malicious GET requests containing script tags or suspicious payloads targeting these parameters.

Educate users about the risks of clicking on suspicious links and monitor logs for exploitation attempts.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart