PatchSiren cyber security CVE debrief
CVE-2022-45085 Gruparge CVE debrief
CVE-2022-45085 is a server-side request forgery (SSRF) vulnerability affecting Smartpower Web versions before 23.01.01. NVD maps the issue to CWE-918 and rates it CVSS 3.1 6.5/Medium. Because the attack vector is network-based and requires only low privileges with no user interaction, affected deployments should be prioritized for update and access review.
- Vendor
- Gruparge
- Product
- Smartpower Web
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2023-02-12
- Original CVE updated
- 2026-05-18
- Advisory published
- 2023-02-12
- Advisory updated
- 2026-05-18
Who should care
Organizations running Smartpower Web before 23.01.01, especially administrators who expose the application to less-trusted users, networks, or integrations that could be abused to trigger server-side requests.
Technical summary
The NVD record describes a SSRF condition in Smartpower Web, with affected versions ending before 23.01.01. The CVSS vector is AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, indicating remote reachability, low attack complexity, low required privileges, no user interaction, and primary confidentiality impact. The listed weakness is CWE-918. Public references include NVD and USOM advisories.
Defensive priority
High for any environment still running Smartpower Web before 23.01.01. The combination of remote reachability, low privileges, and confidentiality impact makes this a meaningful exposure even though the overall CVSS score is Medium.
Recommended defensive actions
- Upgrade Smartpower Web to version 23.01.01 or later.
- Review any externally reachable or user-influenced features that can trigger outbound requests from the application.
- Restrict network egress from the Smartpower Web host to only necessary destinations.
- Monitor logs for unusual outbound request patterns or unexpected internal address access attempts.
- If immediate upgrading is not possible, place compensating controls around the application and its outbound network access.
Evidence notes
The vulnerability description, affected version boundary, and severity come from the supplied CVE/NVD corpus: Smartpower Web before 23.01.01, CVSS 6.5/Medium, and CVSS vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. Weakness mapping is CWE-918 from NVD and the USOM-linked advisory. Publication timing is based on the supplied CVE publishedAt value of 2023-02-12T04:15:16.397Z; modifiedAt is 2026-05-18T16:16:28.010Z.
Official resources
-
CVE-2022-45085 CVE record
CVE.org
-
CVE-2022-45085 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
Publicly disclosed in the supplied CVE record on 2023-02-12; the record was later modified on 2026-05-18. References point to NVD and USOM advisory pages.