Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.apache.nifi/nifi-jolt-transform-json-ui@1.13.1
Typemaven
Namespaceorg.apache.nifi
Namenifi-jolt-transform-json-ui
Version1.13.1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.24.0
Latest_non_vulnerable_version1.24.0
Affected_by_vulnerabilities
0
url VCID-hy35-v2p5-2ycq
vulnerability_id VCID-hy35-v2p5-2ycq
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Apache NiFi 0.7.0 through 1.23.2 include the JoltTransformJSON Processor, which provides an advanced configuration user interface that is vulnerable to DOM-based cross-site scripting. If an authenticated user, who is authorized to configure a JoltTransformJSON Processor, visits a crafted URL, then arbitrary
JavaScript code can be executed within the session context of the authenticated user. Upgrading to Apache NiFi 1.24.0 or 2.0.0-M1 is the recommended mitigation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-49145
reference_id
reference_type
scores
0
value 0.00293
scoring_system epss
scoring_elements 0.52552
published_at 2026-04-02T12:55:00Z
1
value 0.00293
scoring_system epss
scoring_elements 0.52656
published_at 2026-04-18T12:55:00Z
2
value 0.00293
scoring_system epss
scoring_elements 0.52649
published_at 2026-04-16T12:55:00Z
3
value 0.00293
scoring_system epss
scoring_elements 0.5261
published_at 2026-04-13T12:55:00Z
4
value 0.00293
scoring_system epss
scoring_elements 0.52625
published_at 2026-04-12T12:55:00Z
5
value 0.00293
scoring_system epss
scoring_elements 0.52642
published_at 2026-04-11T12:55:00Z
6
value 0.00293
scoring_system epss
scoring_elements 0.52591
published_at 2026-04-09T12:55:00Z
7
value 0.00293
scoring_system epss
scoring_elements 0.52545
published_at 2026-04-07T12:55:00Z
8
value 0.00293
scoring_system epss
scoring_elements 0.52578
published_at 2026-04-04T12:55:00Z
9
value 0.00293
scoring_system epss
scoring_elements 0.52597
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-49145
1
reference_url https://github.com/apache/nifi
reference_id
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/nifi
2
reference_url https://github.com/apache/nifi/commit/50efc55df6bb00ea15adcc2459d5cc82d128857f
reference_id
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/nifi/commit/50efc55df6bb00ea15adcc2459d5cc82d128857f
3
reference_url https://github.com/apache/nifi/pull/8060
reference_id
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/nifi/pull/8060
4
reference_url https://issues.apache.org/jira/browse/NIFI-12403
reference_id
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://issues.apache.org/jira/browse/NIFI-12403
5
reference_url https://lists.apache.org/thread/j8rd0qsvgoj0khqck5f49jfbp0fm8r1o
reference_id
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread/j8rd0qsvgoj0khqck5f49jfbp0fm8r1o
6
reference_url https://nifi.apache.org/security.html#CVE-2023-49145
reference_id
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nifi.apache.org/security.html#CVE-2023-49145
7
reference_url http://www.openwall.com/lists/oss-security/2023/11/27/5
reference_id
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2023/11/27/5
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-49145
reference_id CVE-2023-49145
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-49145
9
reference_url https://github.com/advisories/GHSA-68pr-6fjc-wmgm
reference_id GHSA-68pr-6fjc-wmgm
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-68pr-6fjc-wmgm
fixed_packages
0
url pkg:maven/org.apache.nifi/nifi-jolt-transform-json-ui@1.24.0
purl pkg:maven/org.apache.nifi/nifi-jolt-transform-json-ui@1.24.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi/nifi-jolt-transform-json-ui@1.24.0
aliases CVE-2023-49145, GHSA-68pr-6fjc-wmgm
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hy35-v2p5-2ycq
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi/nifi-jolt-transform-json-ui@1.13.1