Vulnerability Details CVE-2021-23443
This affects the package edge.js before 5.3.2. A type confusion vulnerability can be used to bypass input sanitization when the input to be rendered is an array (instead of a string or a SafeValue), even if {{ }} are used.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 47.2%
CVSS Severity
CVSS v3 Score 5.4
CVSS v2 Score 5.8
Products affected by CVE-2021-23443
-
cpe:2.3:a:adonisjs:edge:1.0.0
-
cpe:2.3:a:adonisjs:edge:1.0.1
-
cpe:2.3:a:adonisjs:edge:1.0.2
-
cpe:2.3:a:adonisjs:edge:1.1.0
-
cpe:2.3:a:adonisjs:edge:1.1.1
-
cpe:2.3:a:adonisjs:edge:1.1.2
-
cpe:2.3:a:adonisjs:edge:1.1.3
-
cpe:2.3:a:adonisjs:edge:1.1.4
-
cpe:2.3:a:adonisjs:edge:2.0.0
-
cpe:2.3:a:adonisjs:edge:2.0.1
-
cpe:2.3:a:adonisjs:edge:2.0.2
-
cpe:2.3:a:adonisjs:edge:2.1.0
-
cpe:2.3:a:adonisjs:edge:2.2.0
-
cpe:2.3:a:adonisjs:edge:3.0.0
-
cpe:2.3:a:adonisjs:edge:3.0.1
-
cpe:2.3:a:adonisjs:edge:3.0.2
-
cpe:2.3:a:adonisjs:edge:3.0.3
-
cpe:2.3:a:adonisjs:edge:3.0.4
-
cpe:2.3:a:adonisjs:edge:3.0.5
-
cpe:2.3:a:adonisjs:edge:3.1.0
-
cpe:2.3:a:adonisjs:edge:3.1.1
-
cpe:2.3:a:adonisjs:edge:3.1.2
-
cpe:2.3:a:adonisjs:edge:3.2.0
-
cpe:2.3:a:adonisjs:edge:3.2.1
-
cpe:2.3:a:adonisjs:edge:3.3.0
-
cpe:2.3:a:adonisjs:edge:3.4.0
-
cpe:2.3:a:adonisjs:edge:3.5.0
-
cpe:2.3:a:adonisjs:edge:3.5.1
-
cpe:2.3:a:adonisjs:edge:4.0.0
-
cpe:2.3:a:adonisjs:edge:4.0.1
-
cpe:2.3:a:adonisjs:edge:4.0.2
-
cpe:2.3:a:adonisjs:edge:4.0.3
-
cpe:2.3:a:adonisjs:edge:4.0.4
-
cpe:2.3:a:adonisjs:edge:5.0.0
-
cpe:2.3:a:adonisjs:edge:5.1.0
-
cpe:2.3:a:adonisjs:edge:5.1.1
-
cpe:2.3:a:adonisjs:edge:5.2.0
-
cpe:2.3:a:adonisjs:edge:5.2.1
-
cpe:2.3:a:adonisjs:edge:5.2.2
-
cpe:2.3:a:adonisjs:edge:5.3.0
-
cpe:2.3:a:adonisjs:edge:5.3.1