An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.0.0"
}
]
},
{
"events": [
{
"introduced": "5.0.0"
},
{
"fixed": "5.0.25"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.0.25-NA"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-35229.json"