Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-23605: CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer in wireapp wire-webapp

0
Medium
Published: Fri Feb 04 2022 (02/04/2022, 22:32:05 UTC)
Source: CVE
Vendor/Project: wireapp
Product: wire-webapp

Description

Wire webapp is a web client for the wire messaging protocol. In versions prior to 2022-01-27-production.0 expired ephemeral messages were not reliably removed from local chat history of Wire Webapp. In versions before 2022-01-27-production.0 ephemeral messages and assets might still be accessible through the local search functionality. Any attempt to view one of these message in the chat view will then trigger the deletion. This issue only affects locally stored messages. On premise instances of wire-webapp need to be updated to 2022-01-27-production.0, so that their users are no longer affected. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/23/2025, 17:48:14 UTC

Technical Analysis

CVE-2022-23605 is a vulnerability identified in the Wire Webapp, a web client for the Wire messaging protocol. The issue pertains to improper removal of sensitive information before storage or transfer, classified under CWE-212. Specifically, in versions of Wire Webapp prior to 2022-01-27-production.0, expired ephemeral messages were not reliably deleted from the local chat history. Although these messages are intended to be ephemeral and thus transient, the flaw allowed them to remain accessible locally through the search functionality. When a user attempts to view one of these expired messages in the chat interface, the deletion process is then triggered, but until that point, the sensitive ephemeral content remains retrievable. This vulnerability affects only locally stored messages on the client side and does not impact messages stored on the server or transmitted over the network. The issue is particularly relevant for on-premise deployments of Wire Webapp, which require updating to version 2022-01-27-production.0 or later to mitigate the risk. No known workarounds exist, and no exploits have been reported in the wild to date. The vulnerability arises from insufficient sanitization and removal of sensitive ephemeral data, potentially exposing confidential information that users expect to be deleted automatically. The flaw compromises the confidentiality of ephemeral messages, which are often used for sensitive communication due to their transient nature.

Potential Impact

For European organizations, especially those relying on Wire Webapp for secure communications, this vulnerability could lead to unintended exposure of sensitive ephemeral messages stored locally on user devices. This exposure risks confidentiality breaches, particularly in sectors handling sensitive data such as finance, healthcare, legal, and government agencies. Since ephemeral messages are designed to disappear, users may have a false sense of security, increasing the risk of sensitive information leakage if devices are shared, lost, or compromised. The impact is limited to local device compromise scenarios; however, in environments with shared or less secure endpoints, the risk is amplified. The vulnerability does not affect message integrity or availability but undermines trust in the ephemeral messaging feature. European organizations with on-premise Wire Webapp deployments are at higher risk, as cloud-hosted instances may be updated by the vendor more promptly. The lack of known exploits reduces immediate risk, but the potential for data leakage remains significant, especially in high-security environments.

Mitigation Recommendations

The primary mitigation is to update all on-premise Wire Webapp instances to version 2022-01-27-production.0 or later, which includes the fix for this vulnerability. Organizations should implement strict update policies to ensure timely patching of communication tools. Additionally, endpoint security controls should be enhanced to limit unauthorized access to local storage where ephemeral messages reside. Employing disk encryption and secure user authentication can reduce the risk of local data exposure. Organizations should also educate users about the limitations of ephemeral messaging and the importance of device security. For environments where immediate patching is not feasible, restricting local search functionality or disabling ephemeral messaging temporarily may reduce exposure, although these are not official workarounds. Regular audits of local data storage and logs can help detect residual sensitive information. Finally, integrating endpoint detection and response (EDR) solutions can help monitor for suspicious access to local message stores.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-01-19T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf23de

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 5:48:14 PM

Last updated: 2/7/2026, 9:09:21 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats