Skip to main content

CVE-2022-24864: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in OriginProtocol origin-website

Medium
Published: Wed Apr 20 2022 (04/20/2022, 18:25:12 UTC)
Source: CVE
Vendor/Project: OriginProtocol
Product: origin-website

Description

Origin Protocol is a blockchain based project. The Origin Protocol project website allows for malicious users to inject malicious Javascript via a POST request to `/presale/join`. User-controlled data is passed with no sanitization to SendGrid and injected into an email that is delivered to the founders@originprotocol.com. If the email recipient is using an email program that is susceptible to XSS, then that email recipient will receive an email that may contain malicious XSS. Regardless if the email recipient’s mail program has vulnerabilities or not, the hacker can at the very least inject malicious HTML that modifies the body content of the email. There are currently no known workarounds.

AI-Powered Analysis

AILast updated: 06/23/2025, 10:36:19 UTC

Technical Analysis

CVE-2022-24864 is a cross-site scripting (XSS) vulnerability identified in the Origin Protocol's origin-website, a blockchain-based project platform. The vulnerability arises from improper neutralization of user input (CWE-79) during web page generation. Specifically, malicious users can submit crafted POST requests to the `/presale/join` endpoint containing JavaScript code that is not sanitized before being passed to SendGrid, an email delivery service. This user-controlled data is embedded directly into an email sent to founders@originprotocol.com. If the email client used by the recipient is vulnerable to XSS attacks, the malicious script can execute within the context of the email client, potentially leading to unauthorized actions such as session hijacking, credential theft, or further malware delivery. Even if the email client is not vulnerable to script execution, the attacker can still inject malicious HTML content that alters the email body, which could be used for phishing or social engineering attacks. There are currently no known workarounds or patches available for this vulnerability, and no known exploits have been reported in the wild. The affected versions are those prior to commit c12d2f2. This vulnerability highlights a critical failure in input validation and output encoding in the email generation process, which is a common vector for XSS attacks. The attack vector requires sending a POST request with malicious payload, but does not require authentication or user interaction beyond the email recipient opening the message in a vulnerable client.

Potential Impact

For European organizations, particularly those involved in blockchain technology, fintech, or decentralized applications, this vulnerability could lead to significant risks. The primary impact is on the confidentiality and integrity of communications within the Origin Protocol team, as attackers can inject malicious scripts into emails sent to founders, potentially compromising sensitive internal information or enabling further attacks within the organization. If exploited, attackers could leverage the XSS to execute arbitrary scripts in the context of the email client, which may lead to credential theft, unauthorized access to internal systems, or the spread of malware. The availability impact is limited but could manifest if malicious scripts disrupt email client functionality. Additionally, the injection of malicious HTML content could facilitate phishing campaigns targeting the organization's leadership or partners, undermining trust and causing reputational damage. Since the vulnerability involves a blockchain project, any compromise could also affect the integrity of blockchain transactions or smart contract interactions if attackers gain further access. European organizations relying on Origin Protocol's platform or collaborating with its team are at risk, especially if their email clients are susceptible to XSS. The lack of patches or workarounds increases the urgency of addressing this vulnerability to prevent potential exploitation.

Mitigation Recommendations

To mitigate this vulnerability, European organizations using or interacting with Origin Protocol should implement several specific measures: 1) Immediate review and sanitization of all user inputs on the `/presale/join` endpoint to ensure that any data passed to SendGrid is properly escaped or encoded to prevent script injection. 2) Implement Content Security Policy (CSP) headers and email client-side protections to reduce the risk of script execution within emails. 3) Use email clients that are known to have robust XSS protections and disable HTML rendering or script execution in emails where possible. 4) Monitor email traffic for suspicious or malformed content that could indicate exploitation attempts. 5) Engage with Origin Protocol developers or maintainers to prioritize patching this vulnerability and apply updates as soon as they become available. 6) Employ network-level protections such as Web Application Firewalls (WAFs) configured to detect and block malicious POST requests targeting the vulnerable endpoint. 7) Conduct security awareness training for recipients of such emails to recognize phishing or suspicious content. 8) Consider isolating or sandboxing email clients used by critical personnel to limit the impact of potential XSS exploitation. These steps go beyond generic advice by focusing on both server-side input validation and client-side email security controls, as well as proactive monitoring and organizational awareness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-02-10T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf2cc1

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 10:36:19 AM

Last updated: 7/28/2025, 5:41:32 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats