Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-23637: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in k-box k-box

0
Medium
Published: Mon Feb 14 2022 (02/14/2022, 20:45:11 UTC)
Source: CVE
Vendor/Project: k-box
Product: k-box

Description

K-Box is a web-based application to manage documents, images, videos and geodata. Prior to version 0.33.1, a stored Cross-Site-Scripting (XSS) vulnerability is present in the markdown editor used by the document abstract and markdown file preview. A specifically crafted anchor link can, if clicked, execute untrusted javascript actions, like retrieving user cookies. Version 0.33.1 includes a patch that allows discarding unsafe links.

AI-Powered Analysis

AILast updated: 06/23/2025, 16:04:15 UTC

Technical Analysis

CVE-2022-23637 is a stored Cross-Site Scripting (XSS) vulnerability affecting versions of the k-box web-based document management application prior to 0.33.1. K-box is used to manage documents, images, videos, and geodata through a web interface. The vulnerability resides in the markdown editor component, specifically in the handling of anchor links within document abstracts and markdown file previews. An attacker can craft a malicious anchor link containing embedded JavaScript code. When a legitimate user clicks this link, the injected script executes in the context of the victim's browser session. This can lead to unauthorized actions such as stealing session cookies, which may allow the attacker to hijack user sessions or perform other malicious activities. The root cause is improper neutralization of input during web page generation (CWE-79), meaning that unsafe links are not sanitized or discarded prior to rendering. The vulnerability was addressed in version 0.33.1 by implementing a patch that discards unsafe links, thereby preventing execution of untrusted scripts. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk due to the potential for persistent XSS attacks that can compromise user confidentiality and integrity of sessions. The attack requires user interaction (clicking the malicious link) but does not require authentication to trigger the vulnerability, although the impact is greater if the victim is authenticated. The scope is limited to users of vulnerable k-box instances, which are typically deployed in organizations managing digital assets and geospatial data.

Potential Impact

For European organizations using k-box versions prior to 0.33.1, this vulnerability could lead to session hijacking, unauthorized access to sensitive documents, and potential lateral movement within the affected environment. Confidentiality is at risk because attackers can steal cookies and impersonate users, potentially gaining access to confidential documents and geodata. Integrity may be compromised if attackers inject malicious content or manipulate documents. Availability impact is limited but could occur if attackers leverage the vulnerability to disrupt user sessions or application functionality. Given that k-box is used for managing critical digital assets, exploitation could result in data breaches, intellectual property theft, and regulatory compliance violations under GDPR. The requirement for user interaction (clicking a malicious link) somewhat limits the attack vector but does not eliminate risk, especially in environments where social engineering or phishing attacks are common. Organizations with remote or hybrid workforces may be particularly vulnerable if users access k-box from less secure networks. The absence of known exploits suggests the vulnerability is not yet widely weaponized, but the medium severity rating indicates a moderate risk that should be addressed promptly.

Mitigation Recommendations

1. Upgrade all k-box instances to version 0.33.1 or later immediately to apply the official patch that discards unsafe links in the markdown editor. 2. Implement strict Content Security Policy (CSP) headers to restrict execution of inline scripts and reduce the impact of any residual XSS vectors. 3. Conduct user awareness training focused on phishing and social engineering to reduce the likelihood of users clicking malicious links. 4. Review and sanitize all user-generated content before it is rendered, applying additional server-side input validation and output encoding where feasible. 5. Monitor application logs for unusual activity related to markdown content or anchor link usage to detect potential exploitation attempts. 6. If upgrading is not immediately possible, consider disabling the markdown preview feature or restricting markdown editing permissions to trusted users only. 7. Regularly audit and update web application security controls and perform penetration testing focused on XSS vulnerabilities in document management workflows.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-01-19T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf25bf

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 4:04:15 PM

Last updated: 2/7/2026, 4:24:18 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats