Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Mar 5, 2026
ETAP Safety Manager 1.0.0.32 Unauthenticated Reflected Cross-Site Scripting via Action Parameter
CVE-2022-50802
Description
ETAP Safety Manager 1.0.0.32 contains a cross-site scripting vulnerability in the 'action' GET parameter that allows unauthenticated attackers to inject malicious HTML and JavaScript. Attackers can craft specially formed requests to execute arbitrary scripts in victim browser sessions, potentially stealing credentials or performing unauthorized actions.
Affected products
2- Range: = 1.0.0.32
- ETAP Lighting International NV/ETAP Safety Managerv5Range: 1.0.0.32
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- packetstormsecurity.com/files/168339/mitreexploit
- cxsecurity.com/issue/WLB-2022090031mitrethird-party-advisory
- www.vulncheck.com/advisories/etap-safety-manager-unauthenticated-reflected-cross-site-scripting-via-action-parametermitrethird-party-advisory
- www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5711.phpmitrethird-party-advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/235743mitrevdb-entry
- www.etaplighting.commitreproduct
News mentions
0No linked articles in our index yet.