Vulnerabilities (CVE)

Filtered by vendor Joinbookwyrm Subscribe
Filtered by product Bookwyrm
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-35953 1 Joinbookwyrm 1 Bookwyrm 2023-12-10 N/A 6.1 MEDIUM
BookWyrm is a social network for tracking your reading, talking about books, writing reviews, and discovering what to read next. Some links in BookWyrm may be vulnerable to tabnabbing, a form of phishing that gives attackers an opportunity to redirect a user to a malicious site. The issue was patched in version 0.4.5.
CVE-2022-31136 1 Joinbookwyrm 1 Bookwyrm 2023-12-10 4.3 MEDIUM 6.1 MEDIUM
Bookwyrm is an open source social reading and reviewing program. Versions of Bookwyrm prior to 0.4.1 did not properly sanitize html being rendered to users. Unprivileged users are able to inject scripts into user profiles, book descriptions, and statuses. These vulnerabilities may be exploited as cross site scripting attacks on users viewing these fields. Users are advised to upgrade to version 0.4.1. There are no known workarounds for this issue.
CVE-2022-2651 1 Joinbookwyrm 1 Bookwyrm 2023-12-10 N/A 9.8 CRITICAL
Authentication Bypass by Primary Weakness in GitHub repository bookwyrm-social/bookwyrm prior to 0.4.5.
CVE-2022-35925 1 Joinbookwyrm 1 Bookwyrm 2023-12-10 N/A 9.8 CRITICAL
BookWyrm is a social network for tracking reading. Versions prior to 0.4.5 were found to lack rate limiting on authentication views which allows brute-force attacks. This issue has been patched in version 0.4.5. Admins with existing instances will need to update their `nginx.conf` file that was created when the instance was set up. Users are advised advised to upgrade. Users unable to upgrade may update their nginx.conf files with the changes manually.
CVE-2022-23644 1 Joinbookwyrm 1 Bookwyrm 2023-12-10 6.5 MEDIUM 8.8 HIGH
BookWyrm is a decentralized social network for tracking reading habits and reviewing books. The functionality to load a cover via url is vulnerable to a server-side request forgery attack. Any BookWyrm instance running a version prior to v0.3.0 is susceptible to attack from a logged-in user. The problem has been patched and administrators should upgrade to version 0.3.0 As a workaround, BookWyrm instances can close registration and limit members to trusted individuals.