A clickjacking vulnerability exists in zenml-io/zenml versions up to and including 0.55.5 due to the application's failure to set appropriate X-Frame-Options or Content-Security-Policy HTTP headers. This vulnerability allows an attacker to embed the application UI within an iframe on a malicious page, potentially leading to unauthorized actions by tricking users into interacting with the interface under the attacker's control. The issue was addressed in version 0.56.3.
Metrics
Affected Vendors & Products
References
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 11 Oct 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zenml
Zenml zenml |
|
| CPEs | cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zenml
Zenml zenml |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-06-06T18:18:29.911Z
Updated: 2024-08-01T19:11:53.449Z
Reserved: 2024-03-11T16:19:50.424Z
Link: CVE-2024-2383
Updated: 2024-08-01T19:11:53.449Z
Status : Modified
Published: 2024-06-06T19:15:54.970
Modified: 2024-11-21T09:09:38.170
Link: CVE-2024-2383
No data.
ReportizFlow