Skip to main content

CVE-2022-24799: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wireapp wire-webapp

Medium
Published: Wed Apr 20 2022 (04/20/2022, 17:55:09 UTC)
Source: CVE
Vendor/Project: wireapp
Product: wire-webapp

Description

wire-webapp is the web application interface for the wire messaging service. Insufficient escaping in markdown “code highlighting” in the wire-webapp resulted in the possibility of injecting and executing arbitrary HTML code and thus also JavaScript. If a user receives and views such a malicious message, arbitrary code is injected and executed in the context of the victim. This allows the attacker to fully control the user account. Wire-desktop clients that are connected to a vulnerable wire-webapp version are also vulnerable to this attack. The issue has been fixed in wire-webapp 2022-03-30-production.0 and is already deployed on all Wire managed services. On-premise instances of wire-webapp need to be updated to docker tag 2022-03-30-production.0-v0.29.2-0-d144552 or wire-server 2022-03-30 (chart/4.8.0), so that their applications are no longer affected. There are no known workarounds for this issue. ### Patches * The issue has been fixed in wire-webapp **2022-03-30-production.0** and is already deployed on all Wire managed services. * On-premise instances of wire-webapp need to be updated to docker tag **2022-03-30-production.0-v0.29.2-0-d144552** or wire-server **2022-03-30 (chart/4.8.0)**, so that their applications are no longer affected. ### Workarounds * No workarounds known ### For more information If you have any questions or comments about this advisory feel free to email us at [vulnerability-report@wire.com](mailto:vulnerability-report@wire.com) ### Credits We thank [Posix](https://twitter.com/po6ix) for reporting this vulnerability

AI-Powered Analysis

AILast updated: 06/23/2025, 11:35:20 UTC

Technical Analysis

CVE-2022-24799 is a cross-site scripting (XSS) vulnerability identified in the wire-webapp, the web interface for the Wire messaging service. The root cause is insufficient escaping of user input during markdown code highlighting, which allows an attacker to inject arbitrary HTML and JavaScript code. When a victim user views a maliciously crafted message, the injected script executes in the context of their browser session. This enables the attacker to fully compromise the victim's Wire user account, potentially accessing sensitive communications and impersonating the user. Additionally, Wire desktop clients connected to a vulnerable wire-webapp instance are also susceptible to this attack vector. The vulnerability affects all versions of wire-webapp prior to 2022-03-30-production.0. The vendor has released a fix in version 2022-03-30-production.0, which is already deployed on all Wire-managed services. However, on-premise deployments must manually update to docker tag 2022-03-30-production.0-v0.29.2-0-d144552 or wire-server 2022-03-30 (chart/4.8.0) to remediate the issue. No known workarounds exist, making patching the only effective mitigation. The vulnerability was responsibly disclosed by researcher Posix and has no known active exploits in the wild as of the publication date. This vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation, a common vector for XSS attacks. The attack requires that the victim views the malicious message, but no authentication bypass is needed beyond the victim being logged into their Wire account. The impact is significant due to the ability to hijack user sessions and potentially pivot to further attacks within the compromised account.

Potential Impact

For European organizations using Wire for internal or external communications, this vulnerability poses a moderate to high risk. Successful exploitation could lead to account takeover, exposing sensitive corporate communications, intellectual property, and personal data. Given Wire's focus on secure messaging, organizations relying on it for confidential discussions may face reputational damage and regulatory consequences if data confidentiality is breached. The compromise of user accounts could also enable attackers to impersonate employees, facilitating social engineering or spear-phishing campaigns within the organization. Wire desktop clients connected to vulnerable webapp instances increase the attack surface, potentially affecting endpoint security. The lack of workarounds means that unpatched on-premise deployments remain exposed until updated, increasing risk for organizations managing their own Wire infrastructure. While no active exploits are known, the ease of injecting malicious code via message content and the broad impact on confidentiality and integrity make this a significant threat to European enterprises, especially those in regulated sectors such as finance, healthcare, and government.

Mitigation Recommendations

1. Immediate patching of all on-premise wire-webapp instances to version 2022-03-30-production.0 or later is critical. Use the specified docker tag (2022-03-30-production.0-v0.29.2-0-d144552) or wire-server chart (4.8.0) to ensure full remediation. 2. Verify that all Wire-managed services are running the patched version; coordinate with service providers to confirm updates. 3. Conduct an audit of user accounts and recent message activity to detect any suspicious behavior indicative of compromise. 4. Implement strict content filtering and monitoring on messaging platforms to detect and block suspicious markdown or code snippets that could exploit similar vulnerabilities. 5. Educate users on the risks of clicking unknown or unexpected links and viewing messages from untrusted sources, emphasizing caution even within trusted communication channels. 6. For organizations with on-premise deployments, establish a rapid patch management process to minimize exposure windows for critical vulnerabilities. 7. Monitor Wire security advisories and vulnerability disclosures for any updates or emerging exploit information. 8. Consider deploying Content Security Policy (CSP) headers and other browser security mechanisms to limit the impact of potential XSS attacks where feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-02-10T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf2bd8

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 11:35:20 AM

Last updated: 8/16/2025, 5:25:28 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats