### [CVE-2022-22117](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22117) ![](https://img.shields.io/static/v1?label=Product&message=directus&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%209.0.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen) ### Description In Directus, versions 9.0.0-alpha.4 through 9.4.1 allow unrestricted file upload of .html files in the media upload functionality, which leads to Cross-Site Scripting vulnerability. A low privileged attacker can upload a crafted HTML file as a profile avatar, and when an admin or another user opens it, the XSS payload gets triggered. ### POC #### Reference - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22117 #### Github No PoCs found on GitHub currently.