PatchSiren cyber security CVE debrief
CVE-2022-50963 Apphp CVE debrief
uBidAuction 2.0.1 is reported to have a reflected cross-site scripting issue in the auctions/myAuctions/status/active module. Crafted GET requests targeting filter parameters such as date_created, date_from, date_to, and created_at can cause attacker-supplied script to execute in a victim’s browser.
- Vendor
- Apphp
- Product
- Unknown
- CVSS
- MEDIUM 5.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-10
- Original CVE updated
- 2026-05-10
- Advisory published
- 2026-05-10
- Advisory updated
- 2026-05-10
Who should care
Administrators, developers, and security teams running uBidAuction 2.0.1, especially deployments exposing the auctions/myAuctions/status/active endpoint or similar filter views to untrusted users.
Technical summary
The supplied record describes a reflected XSS weakness (CWE-79) in request handling for the active-auctions filter path. NVD metadata shows a CVSS v4 vector with network attack reachability and user interaction required, consistent with browser-side script execution when unsanitized query values are reflected into the response.
Defensive priority
Medium
Recommended defensive actions
- Treat the affected filter parameters as untrusted input and apply context-aware output encoding before rendering them.
- Add server-side validation or allowlisting for date_created, date_from, date_to, and created_at, and review adjacent parameters in the same module.
- Patch or upgrade uBidAuction once a fixed release is available from the vendor, and verify the fix against the official vendor page.
- Add a Content Security Policy and other browser-side hardening to reduce the impact of reflected script injection.
- Inspect logs and WAF telemetry for crafted requests to auctions/myAuctions/status/active and related GET-based filter endpoints.
Evidence notes
The CVE description states that uBidAuction 2.0.1 reflects unsanitized date_created, date_from, date_to, and created_at parameters in the auctions/myAuctions/status/active filter path, enabling remote script injection via crafted GET requests. The NVD source item lists CWE-79 and a CVSS v4 vector with network access and user interaction required, and the corpus links official CVE/NVD records plus vendor and third-party advisory references.
Official resources
The supplied metadata shows publication and modification timestamps of 2026-05-10T13:16:34.090Z for the CVE/NVD record, with supporting vendor and third-party references in the corpus. No KEV entry is present in the supplied enrichment.