### [CVE-2022-1290](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1290) ![](https://img.shields.io/static/v1?label=Product&message=polonel%2Ftrudesk&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%20v1.2.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) ### Description Stored XSS in "Name", "Group Name" & "Title" in GitHub repository polonel/trudesk prior to v1.2.0. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse. ### POC #### Reference - https://huntr.dev/bounties/da6d03e6-053f-43b6-99a7-78c2e386e3ed #### Github No PoCs found on GitHub currently.