CVE-2022-21695: CWE-287: Improper Authentication in onionshare onionshare
OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions authenticated users (or unauthenticated in public mode) can send messages without being visible in the list of chat participants. This issue has been resolved in version 2.5.
AI Analysis
Technical Summary
CVE-2022-21695 is a medium-severity vulnerability classified under CWE-287 (Improper Authentication) affecting versions of OnionShare prior to 2.5. OnionShare is an open-source application designed to enable secure and anonymous file sharing, website hosting, and chat communication over the Tor network. The vulnerability allows authenticated users, or even unauthenticated users in public mode, to send chat messages without being listed as visible participants in the chat session. This flaw undermines the integrity of participant visibility and authentication mechanisms within OnionShare's chat functionality. Essentially, it permits a user to masquerade as a hidden participant, potentially enabling covert communication or unauthorized message injection without detection by other users. The issue was addressed and resolved in OnionShare version 2.5. No known exploits have been reported in the wild to date. The vulnerability does not appear to require elevated privileges beyond normal user access, and it affects all versions prior to 2.5. Given OnionShare’s reliance on the Tor network for anonymity, this improper authentication could be exploited to bypass expected participant transparency in chat sessions, potentially facilitating malicious activities such as misinformation, unauthorized data exchange, or evasion of accountability within the communication channel.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the extent to which OnionShare is used for sensitive communications or data exchange. Organizations leveraging OnionShare for secure, anonymous collaboration or file sharing could face risks related to unauthorized message injection or covert communication by hidden participants. This could lead to misinformation, data leakage, or manipulation of communication flows without detection. While OnionShare is primarily used for privacy-focused communications, sectors such as journalism, human rights groups, and certain research entities in Europe that rely on anonymity and secure messaging could be particularly affected. The vulnerability compromises the integrity and non-repudiation aspects of communication, potentially undermining trust in the platform. However, since no known exploits are reported and the vulnerability requires at least user-level access or public mode usage, the overall risk to large enterprises or critical infrastructure is limited unless OnionShare is explicitly used in their workflows. The availability and confidentiality of the system are not directly impacted by this flaw, but the integrity of chat communications is at risk.
Mitigation Recommendations
To mitigate this vulnerability, European organizations and users should upgrade OnionShare installations to version 2.5 or later, where the issue has been resolved. For environments where immediate upgrading is not feasible, organizations should consider disabling the chat functionality or restricting access to trusted users only, especially avoiding public mode usage. Monitoring chat logs and participant lists for anomalies could help detect suspicious hidden participants. Additionally, organizations should educate users about the risks of using outdated OnionShare versions and encourage strict operational security practices when sharing sensitive information. Network-level controls could be implemented to limit OnionShare usage to authorized endpoints. Finally, integrating OnionShare usage policies within broader organizational security frameworks will help ensure that only vetted users can leverage the tool, reducing the risk of exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium
CVE-2022-21695: CWE-287: Improper Authentication in onionshare onionshare
Description
OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions authenticated users (or unauthenticated in public mode) can send messages without being visible in the list of chat participants. This issue has been resolved in version 2.5.
AI-Powered Analysis
Technical Analysis
CVE-2022-21695 is a medium-severity vulnerability classified under CWE-287 (Improper Authentication) affecting versions of OnionShare prior to 2.5. OnionShare is an open-source application designed to enable secure and anonymous file sharing, website hosting, and chat communication over the Tor network. The vulnerability allows authenticated users, or even unauthenticated users in public mode, to send chat messages without being listed as visible participants in the chat session. This flaw undermines the integrity of participant visibility and authentication mechanisms within OnionShare's chat functionality. Essentially, it permits a user to masquerade as a hidden participant, potentially enabling covert communication or unauthorized message injection without detection by other users. The issue was addressed and resolved in OnionShare version 2.5. No known exploits have been reported in the wild to date. The vulnerability does not appear to require elevated privileges beyond normal user access, and it affects all versions prior to 2.5. Given OnionShare’s reliance on the Tor network for anonymity, this improper authentication could be exploited to bypass expected participant transparency in chat sessions, potentially facilitating malicious activities such as misinformation, unauthorized data exchange, or evasion of accountability within the communication channel.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the extent to which OnionShare is used for sensitive communications or data exchange. Organizations leveraging OnionShare for secure, anonymous collaboration or file sharing could face risks related to unauthorized message injection or covert communication by hidden participants. This could lead to misinformation, data leakage, or manipulation of communication flows without detection. While OnionShare is primarily used for privacy-focused communications, sectors such as journalism, human rights groups, and certain research entities in Europe that rely on anonymity and secure messaging could be particularly affected. The vulnerability compromises the integrity and non-repudiation aspects of communication, potentially undermining trust in the platform. However, since no known exploits are reported and the vulnerability requires at least user-level access or public mode usage, the overall risk to large enterprises or critical infrastructure is limited unless OnionShare is explicitly used in their workflows. The availability and confidentiality of the system are not directly impacted by this flaw, but the integrity of chat communications is at risk.
Mitigation Recommendations
To mitigate this vulnerability, European organizations and users should upgrade OnionShare installations to version 2.5 or later, where the issue has been resolved. For environments where immediate upgrading is not feasible, organizations should consider disabling the chat functionality or restricting access to trusted users only, especially avoiding public mode usage. Monitoring chat logs and participant lists for anomalies could help detect suspicious hidden participants. Additionally, organizations should educate users about the risks of using outdated OnionShare versions and encourage strict operational security practices when sharing sensitive information. Network-level controls could be implemented to limit OnionShare usage to authorized endpoints. Finally, integrating OnionShare usage policies within broader organizational security frameworks will help ensure that only vetted users can leverage the tool, reducing the risk of exploitation.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2021-11-16T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9842c4522896dcbf2311
Added to database: 5/21/2025, 9:09:22 AM
Last enriched: 6/23/2025, 6:17:02 PM
Last updated: 2/7/2026, 3:36:25 PM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.