Search for vulnerabilities
Vulnerability details: VCID-ef83-dy1p-g7fp
Vulnerability ID VCID-ef83-dy1p-g7fp
Aliases CVE-2022-23515
GHSA-228g-948r-83gx
GMS-2022-8287
Summary Improper neutralization of data URIs may allow XSS in Loofah ## Summary Loofah `>= 2.1.0, < 2.19.1` is vulnerable to cross-site scripting via the `image/svg+xml` media type in data URIs. ## Mitigation Upgrade to Loofah `>= 2.19.1`.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 6.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23515.json
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2022-23515
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2022-23515
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2022-23515
epss 0.00236 https://api.first.org/data/v1/epss?cve=CVE-2022-23515
epss 0.00236 https://api.first.org/data/v1/epss?cve=CVE-2022-23515
epss 0.00236 https://api.first.org/data/v1/epss?cve=CVE-2022-23515
epss 0.00236 https://api.first.org/data/v1/epss?cve=CVE-2022-23515
epss 0.00236 https://api.first.org/data/v1/epss?cve=CVE-2022-23515
epss 0.00236 https://api.first.org/data/v1/epss?cve=CVE-2022-23515
epss 0.00236 https://api.first.org/data/v1/epss?cve=CVE-2022-23515
epss 0.00236 https://api.first.org/data/v1/epss?cve=CVE-2022-23515
epss 0.00236 https://api.first.org/data/v1/epss?cve=CVE-2022-23515
epss 0.00236 https://api.first.org/data/v1/epss?cve=CVE-2022-23515
epss 0.00236 https://api.first.org/data/v1/epss?cve=CVE-2022-23515
epss 0.00236 https://api.first.org/data/v1/epss?cve=CVE-2022-23515
epss 0.00236 https://api.first.org/data/v1/epss?cve=CVE-2022-23515
epss 0.00236 https://api.first.org/data/v1/epss?cve=CVE-2022-23515
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2022-23515
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2022-23515
cvssv3.1 6.1 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-228g-948r-83gx
cvssv3.1 6.1 https://github.com/flavorjones/loofah
generic_textual MODERATE https://github.com/flavorjones/loofah
cvssv3.1 6.1 https://github.com/flavorjones/loofah/commit/415677f3cf7f9254f42f811e784985cd63c7407f
generic_textual MODERATE https://github.com/flavorjones/loofah/commit/415677f3cf7f9254f42f811e784985cd63c7407f
cvssv3.1 6.1 https://github.com/flavorjones/loofah/issues/101
generic_textual MODERATE https://github.com/flavorjones/loofah/issues/101
cvssv3 6.1 https://github.com/flavorjones/loofah/security/advisories/GHSA-228g-948r-83gx
cvssv3.1 6.1 https://github.com/flavorjones/loofah/security/advisories/GHSA-228g-948r-83gx
cvssv3.1_qr MODERATE https://github.com/flavorjones/loofah/security/advisories/GHSA-228g-948r-83gx
generic_textual MODERATE https://github.com/flavorjones/loofah/security/advisories/GHSA-228g-948r-83gx
cvssv3.1 6.1 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/loofah/CVE-2022-23515.yml
generic_textual MODERATE https://github.com/rubysec/ruby-advisory-db/blob/master/gems/loofah/CVE-2022-23515.yml
cvssv3.1 6.1 https://github.com/w3c/svgwg/issues/266
generic_textual MODERATE https://github.com/w3c/svgwg/issues/266
cvssv3.1 6.1 https://hackerone.com/reports/1694173
generic_textual MODERATE https://hackerone.com/reports/1694173
cvssv3.1 6.1 https://lists.debian.org/debian-lts-announce/2023/09/msg00011.html
generic_textual MODERATE https://lists.debian.org/debian-lts-announce/2023/09/msg00011.html
cvssv3.1 6.1 https://nvd.nist.gov/vuln/detail/CVE-2022-23515
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2022-23515
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23515.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/flavorjones/loofah
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/flavorjones/loofah/commit/415677f3cf7f9254f42f811e784985cd63c7407f
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/flavorjones/loofah/issues/101
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/flavorjones/loofah/security/advisories/GHSA-228g-948r-83gx
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/rubysec/ruby-advisory-db/blob/master/gems/loofah/CVE-2022-23515.yml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/w3c/svgwg/issues/266
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://hackerone.com/reports/1694173
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://lists.debian.org/debian-lts-announce/2023/09/msg00011.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-23515
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.37124
EPSS Score 0.00154
Published At Aug. 1, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:05:05.157803+00:00 Ruby Importer Import https://github.com/rubysec/ruby-advisory-db/blob/master/gems/loofah/CVE-2022-23515.yml 37.0.0