CVE-2022-50968
Reflected XSS in uBidAuction Auctions Module
Publication date: 2026-05-10
Last updated on: 2026-05-10
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2022-50968 is a reflected cross-site scripting (XSS) vulnerability found in uBidAuction version 2.0.1, specifically in the auctions/manage module.
The vulnerability arises because the parameters date_created, date_from, date_to, and created_at in the filter functionality are not properly sanitized.
This improper input sanitization allows remote attackers to craft malicious GET requests that inject scripts which then execute in the browsers of victims.
How can this vulnerability impact me? :
This vulnerability can allow attackers to execute malicious scripts in the browsers of users who visit the affected module with crafted GET requests.
Such script execution can lead to theft of sensitive information, session hijacking, or other malicious actions performed on behalf of the victim.
Because the attack is reflected, it requires the victim to interact with a specially crafted link or request.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for suspicious or crafted GET requests targeting the auctions/manage module, specifically those including the parameters date_created, date_from, date_to, and created_at.
One way to detect potential exploitation attempts is to analyze web server logs for unusual or script-injected values in these parameters.
For example, you can use command-line tools like grep to search for suspicious patterns in access logs:
- grep -iE 'date_created=|date_from=|date_to=|created_at=' /var/log/apache2/access.log | grep -E '<script|%3Cscript'
- Use web vulnerability scanners or proxy tools to send crafted GET requests to the auctions/manage module and observe if the input is reflected unsanitized in the response.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting or sanitizing input parameters date_created, date_from, date_to, and created_at in the auctions/manage module to prevent injection of malicious scripts.
If a patch or update for uBidAuction 2.0.1 is available, apply it promptly to fix the reflected XSS vulnerability.
As a temporary measure, consider implementing web application firewall (WAF) rules to block requests containing suspicious script tags or encoded script payloads in these parameters.
Additionally, educate users to avoid clicking on suspicious links that may exploit this vulnerability.