Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-21691: CWE-306: Missing Authentication for Critical Function in onionshare onionshare

0
Medium
Published: Tue Jan 18 2022 (01/18/2022, 22:00:12 UTC)
Source: CVE
Vendor/Project: onionshare
Product: onionshare

Description

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions chat participants can spoof their channel leave message, tricking others into assuming they left the chatroom.

AI-Powered Analysis

AILast updated: 06/23/2025, 18:17:37 UTC

Technical Analysis

CVE-2022-21691 is a vulnerability identified in OnionShare, an open-source application that enables secure and anonymous file sharing, website hosting, and chat communication over the Tor network. The affected versions are those prior to 2.5. The vulnerability is classified under CWE-306, which refers to missing authentication for a critical function. Specifically, in the chat functionality of OnionShare, participants can spoof their channel leave messages. This means an attacker or malicious participant can send a false notification indicating they have left the chatroom, misleading other users into believing that the participant is no longer present. This spoofing occurs because the application does not properly authenticate the source of the leave message, allowing any participant to impersonate such an event. Although the vulnerability does not directly compromise the confidentiality or integrity of the chat messages or files shared, it undermines the trust and reliability of the chat session's participant status. The flaw does not require elevated privileges or authentication beyond being a chat participant, and no user interaction beyond normal chat participation is necessary to exploit the issue. There are no known exploits in the wild, and no patches are explicitly linked in the provided data, though upgrading to version 2.5 or later is implied to remediate the issue. The vulnerability is medium severity, reflecting its limited but notable impact on user experience and trust within the chat function rather than on core security properties like data confidentiality or system availability.

Potential Impact

For European organizations using OnionShare, particularly those relying on its chat feature for secure communications, this vulnerability could lead to misinformation about participant presence, potentially disrupting coordination or trust in sensitive communications. While it does not allow direct data theft or system compromise, the ability to spoof leave messages could be leveraged in social engineering or operational disruption scenarios, especially in environments where participant presence is critical (e.g., secure collaboration among journalists, activists, or legal professionals). The anonymity and security guarantees of OnionShare could be partially undermined, affecting user confidence. However, since the vulnerability does not enable unauthorized access or data manipulation, the overall impact on confidentiality and integrity is limited. Availability is not affected. Organizations in sectors where trust in communication status is paramount may experience operational challenges or increased risk of misinformation.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade OnionShare to version 2.5 or later, where this issue is addressed. Beyond upgrading, users should implement operational controls such as verifying participant presence through secondary channels or out-of-band confirmation for critical communications. Monitoring chat logs for anomalous leave messages or patterns may help detect spoofing attempts. Additionally, developers and administrators should advocate for and contribute to enhancements in OnionShare’s authentication mechanisms for chat functions, ensuring that critical actions like leaving a channel are cryptographically verified or require stronger authentication. For highly sensitive environments, consider limiting chat participation to trusted users and employing layered communication verification methods. Regularly reviewing and updating security policies around anonymous communication tools will also help mitigate risks stemming from such vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2021-11-16T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf22f9

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 6:17:37 PM

Last updated: 2/7/2026, 5:33:05 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats