CVE-2022-36038

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-36038
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-36038.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-36038
Aliases
  • GHSA-8c8q-4h7g-4rp3
Published
2022-09-06T19:00:14Z
Modified
2025-12-04T10:33:35.021687Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
CircuitVerse potential RCE vulnerability via Oj.load
Details

CircuitVerse is an open-source platform which allows users to construct digital logic circuits online. A remote code execution (RCE) vulnerability in CircuitVerse allows authenticated attackers to execute arbitrary code via specially crafted JSON payloads. This issue may lead to Remote Code Execution (RCE). A patch is available in commit number 7b3023a99499a7675f10f2c1d9effdf10c35fb6e. There are currently no known workarounds.

Database specific
{
    "cwe_ids": [
        "CWE-502"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/36xxx/CVE-2022-36038.json"
}
References

Affected packages

Git / github.com/circuitverse/circuitverse

Affected ranges

Type
GIT
Repo
https://github.com/circuitverse/circuitverse
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed