On NGINX Controller API Management versions 3.18.0-3.19.0, an authenticated attacker with access to the "user" or "admin" role can use undisclosed API endpoints on NGINX Controller API Management to inject JavaScript code that is executed on managed NGINX data plane instances. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://support.f5.com/csp/article/K57735782 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: f5
Published:
Updated: 2024-08-03T03:28:42.829Z
Reserved: 2022-01-10T00:00:00
Link: CVE-2022-23008

No data.

Status : Modified
Published: 2022-01-25T20:15:09.000
Modified: 2024-11-21T06:47:47.630
Link: CVE-2022-23008

No data.