Skip to main content

CVE-2022-21695: CWE-287: Improper Authentication in onionshare onionshare

Medium
Published: Tue Jan 18 2022 (01/18/2022, 21:55:10 UTC)
Source: CVE
Vendor/Project: onionshare
Product: onionshare

Description

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions authenticated users (or unauthenticated in public mode) can send messages without being visible in the list of chat participants. This issue has been resolved in version 2.5.

AI-Powered Analysis

AILast updated: 06/23/2025, 18:17:02 UTC

Technical Analysis

CVE-2022-21695 is a medium-severity vulnerability classified under CWE-287 (Improper Authentication) affecting versions of OnionShare prior to 2.5. OnionShare is an open-source application designed to enable secure and anonymous file sharing, website hosting, and chat communication over the Tor network. The vulnerability allows authenticated users, or even unauthenticated users in public mode, to send chat messages without being listed as visible participants in the chat session. This flaw undermines the integrity of participant visibility and authentication mechanisms within OnionShare's chat functionality. Essentially, it permits a user to masquerade as a hidden participant, potentially enabling covert communication or unauthorized message injection without detection by other users. The issue was addressed and resolved in OnionShare version 2.5. No known exploits have been reported in the wild to date. The vulnerability does not appear to require elevated privileges beyond normal user access, and it affects all versions prior to 2.5. Given OnionShare’s reliance on the Tor network for anonymity, this improper authentication could be exploited to bypass expected participant transparency in chat sessions, potentially facilitating malicious activities such as misinformation, unauthorized data exchange, or evasion of accountability within the communication channel.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the extent to which OnionShare is used for sensitive communications or data exchange. Organizations leveraging OnionShare for secure, anonymous collaboration or file sharing could face risks related to unauthorized message injection or covert communication by hidden participants. This could lead to misinformation, data leakage, or manipulation of communication flows without detection. While OnionShare is primarily used for privacy-focused communications, sectors such as journalism, human rights groups, and certain research entities in Europe that rely on anonymity and secure messaging could be particularly affected. The vulnerability compromises the integrity and non-repudiation aspects of communication, potentially undermining trust in the platform. However, since no known exploits are reported and the vulnerability requires at least user-level access or public mode usage, the overall risk to large enterprises or critical infrastructure is limited unless OnionShare is explicitly used in their workflows. The availability and confidentiality of the system are not directly impacted by this flaw, but the integrity of chat communications is at risk.

Mitigation Recommendations

To mitigate this vulnerability, European organizations and users should upgrade OnionShare installations to version 2.5 or later, where the issue has been resolved. For environments where immediate upgrading is not feasible, organizations should consider disabling the chat functionality or restricting access to trusted users only, especially avoiding public mode usage. Monitoring chat logs and participant lists for anomalies could help detect suspicious hidden participants. Additionally, organizations should educate users about the risks of using outdated OnionShare versions and encourage strict operational security practices when sharing sensitive information. Network-level controls could be implemented to limit OnionShare usage to authorized endpoints. Finally, integrating OnionShare usage policies within broader organizational security frameworks will help ensure that only vetted users can leverage the tool, reducing the risk of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2021-11-16T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf2311

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 6:17:02 PM

Last updated: 8/4/2025, 10:43:53 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats