Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-21692: CWE-287: Improper Authentication in onionshare onionshare

0
Medium
Published: Tue Jan 18 2022 (01/18/2022, 22:10:15 UTC)
Source: CVE
Vendor/Project: onionshare
Product: onionshare

Description

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant.

AI-Powered Analysis

AILast updated: 06/22/2025, 04:08:32 UTC

Technical Analysis

CVE-2022-21692 is a vulnerability classified under CWE-287 (Improper Authentication) affecting versions of OnionShare prior to 2.5. OnionShare is an open-source application designed to facilitate secure and anonymous file sharing, website hosting, and chat communication over the Tor network. The vulnerability allows any participant within the chat environment to impersonate other chat participants by sending messages that appear to originate from them. This flaw arises due to insufficient authentication controls within the chat functionality, enabling unauthorized message spoofing. Since OnionShare operates over the Tor network, it is primarily used by individuals and organizations valuing privacy and anonymity. The vulnerability does not require external authentication or elevated privileges beyond access to the chat environment, which means that any participant in a chat session can exploit this issue. Although no known exploits have been reported in the wild, the potential for misinformation, social engineering, or disruption within trusted communication channels is significant. The vulnerability impacts the integrity and authenticity of chat communications, undermining trust among participants. The flaw does not directly affect confidentiality or availability of the system or data but can indirectly lead to compromised decision-making or exposure to further attacks if malicious actors leverage impersonation to gain trust.

Potential Impact

For European organizations, especially those relying on OnionShare for secure and anonymous communications—such as journalists, human rights groups, activists, and privacy-focused enterprises—this vulnerability poses a risk to the integrity of their communications. The ability to impersonate other chat participants can facilitate misinformation, manipulation, or social engineering attacks, potentially leading to operational disruptions or exposure of sensitive information through trust exploitation. While the vulnerability does not directly compromise data confidentiality or system availability, the erosion of trust in communication channels can have cascading effects, including reputational damage and operational inefficiencies. Organizations using OnionShare in sensitive environments may find their secure communication channels compromised, which is particularly critical in contexts where anonymity and message authenticity are paramount. Given the medium severity and the lack of known exploits, the immediate risk is moderate, but the potential for misuse in targeted attacks remains a concern.

Mitigation Recommendations

To mitigate this vulnerability, affected users should upgrade OnionShare to version 2.5 or later, where the authentication flaw has been addressed. Until an upgrade is possible, organizations should restrict chat access to trusted participants only and consider additional out-of-band verification methods to confirm participant identities during sensitive communications. Implementing strict operational security (OpSec) practices, such as verifying critical messages through alternative secure channels, can reduce the risk of impersonation. Monitoring chat sessions for anomalous behavior or unexpected message patterns may help detect exploitation attempts. Additionally, organizations should educate users about the risk of impersonation and encourage skepticism toward unexpected or unusual chat messages. Since no official patch links are provided, users should obtain updates directly from the official OnionShare project repositories or trusted distribution channels to avoid supply chain risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2021-11-16T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9848c4522896dcbf614d

Added to database: 5/21/2025, 9:09:28 AM

Last enriched: 6/22/2025, 4:08:32 AM

Last updated: 2/7/2026, 10:42:47 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats