- What is the severity of CVE-2022-29266?
- CVE-2022-29266 has been scored as a high severity vulnerability.
- How to fix CVE-2022-29266?
- As a workaround for remediating CVE-2022-29266: 1. Upgrade to 2.13.1 and above 2. Apply the following patch to Apache APISIX and rebuild it: This will make this error message no longer contain sensitive information and return a fixed error message to the caller. For the current LTS 2.13.x or master: https://github.com/apache/apisix/pull/6846 https://github.com/apache/apisix/pull/6847 https://github.com/apache/apisix/pull/6858 For the last LTS 2.10.x: https://github.com/apache/apisix/pull/6847 https://github.com/apache/apisix/pull/6855 3. Manually modify the version you are using according to the commit above and rebuild it to circumvent the vulnerability.
- Is CVE-2022-29266 being actively exploited in the wild?
- It is possible that CVE-2022-29266 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~15% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2022-29266?
- CVE-2022-29266 affects Apache Software Foundation Apache APISIX.