CVE-2022-3004: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yetiforcecompany yetiforcecompany/yetiforcecrm
Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.
AI Analysis
Technical Summary
CVE-2022-3004 is a medium-severity stored Cross-site Scripting (XSS) vulnerability identified in the yetiforcecompany/yetiforcecrm product, a Customer Relationship Management (CRM) system hosted on GitHub. The vulnerability is classified under CWE-79, which involves improper neutralization of input during web page generation. This flaw allows an attacker with at least low privileges (PR:L) to inject malicious scripts that are stored persistently within the application and executed in the browsers of users who access the affected pages. The CVSS 3.0 score of 6.3 reflects that the vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L), does not require user interaction (UI:N), and affects confidentiality, integrity, and availability to a limited extent (C:L/I:L/A:L). The vulnerability affects versions prior to 6.4.0, although the exact affected versions are unspecified. Since it is a stored XSS, the malicious payload can be embedded in data fields such as user inputs, comments, or CRM records, which are then rendered without proper sanitization or encoding. This can lead to session hijacking, unauthorized actions performed on behalf of users, defacement, or distribution of malware. No public exploits are currently known in the wild, and no official patches or mitigation links were provided in the source data. However, the presence of this vulnerability in a CRM platform is significant because CRM systems typically handle sensitive customer and business data and are accessed by multiple users with varying privilege levels.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. CRMs are critical business tools that store personal data, contact information, and business intelligence. Exploitation of this XSS vulnerability could lead to unauthorized access to sensitive customer data, manipulation of CRM records, or the spread of malware within the organization’s network. This could result in data breaches violating GDPR requirements, leading to regulatory fines and reputational damage. Furthermore, attackers could leverage the vulnerability to escalate privileges or move laterally within the network, increasing the risk of broader compromise. Since the vulnerability requires at least low privileges but no user interaction, insider threats or compromised low-level accounts could be leveraged to exploit this flaw. The lack of known public exploits suggests limited active exploitation currently, but the risk remains if attackers develop weaponized payloads. European organizations using yetiforcecrm, especially those handling large volumes of personal or sensitive data, should consider this vulnerability a moderate risk that requires timely remediation to maintain compliance and security posture.
Mitigation Recommendations
To mitigate CVE-2022-3004 effectively, organizations should first upgrade yetiforcecrm to version 6.4.0 or later, where this vulnerability is addressed. If immediate upgrade is not feasible, implement strict input validation and output encoding on all user-supplied data fields within the CRM to neutralize potentially malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the CRM. Additionally, enforce the principle of least privilege by limiting user permissions to only what is necessary, reducing the risk of exploitation by low-privileged accounts. Regularly audit CRM logs for suspicious activities indicative of XSS exploitation attempts. Educate users about the risks of XSS and encourage reporting of unusual behavior. Finally, consider deploying Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting the CRM application.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-3004: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yetiforcecompany yetiforcecompany/yetiforcecrm
Description
Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.
AI-Powered Analysis
Technical Analysis
CVE-2022-3004 is a medium-severity stored Cross-site Scripting (XSS) vulnerability identified in the yetiforcecompany/yetiforcecrm product, a Customer Relationship Management (CRM) system hosted on GitHub. The vulnerability is classified under CWE-79, which involves improper neutralization of input during web page generation. This flaw allows an attacker with at least low privileges (PR:L) to inject malicious scripts that are stored persistently within the application and executed in the browsers of users who access the affected pages. The CVSS 3.0 score of 6.3 reflects that the vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L), does not require user interaction (UI:N), and affects confidentiality, integrity, and availability to a limited extent (C:L/I:L/A:L). The vulnerability affects versions prior to 6.4.0, although the exact affected versions are unspecified. Since it is a stored XSS, the malicious payload can be embedded in data fields such as user inputs, comments, or CRM records, which are then rendered without proper sanitization or encoding. This can lead to session hijacking, unauthorized actions performed on behalf of users, defacement, or distribution of malware. No public exploits are currently known in the wild, and no official patches or mitigation links were provided in the source data. However, the presence of this vulnerability in a CRM platform is significant because CRM systems typically handle sensitive customer and business data and are accessed by multiple users with varying privilege levels.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. CRMs are critical business tools that store personal data, contact information, and business intelligence. Exploitation of this XSS vulnerability could lead to unauthorized access to sensitive customer data, manipulation of CRM records, or the spread of malware within the organization’s network. This could result in data breaches violating GDPR requirements, leading to regulatory fines and reputational damage. Furthermore, attackers could leverage the vulnerability to escalate privileges or move laterally within the network, increasing the risk of broader compromise. Since the vulnerability requires at least low privileges but no user interaction, insider threats or compromised low-level accounts could be leveraged to exploit this flaw. The lack of known public exploits suggests limited active exploitation currently, but the risk remains if attackers develop weaponized payloads. European organizations using yetiforcecrm, especially those handling large volumes of personal or sensitive data, should consider this vulnerability a moderate risk that requires timely remediation to maintain compliance and security posture.
Mitigation Recommendations
To mitigate CVE-2022-3004 effectively, organizations should first upgrade yetiforcecrm to version 6.4.0 or later, where this vulnerability is addressed. If immediate upgrade is not feasible, implement strict input validation and output encoding on all user-supplied data fields within the CRM to neutralize potentially malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the CRM. Additionally, enforce the principle of least privilege by limiting user permissions to only what is necessary, reducing the risk of exploitation by low-privileged accounts. Regularly audit CRM logs for suspicious activities indicative of XSS exploitation attempts. Educate users about the risks of XSS and encourage reporting of unusual behavior. Finally, consider deploying Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting the CRM application.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntrdev
- Date Reserved
- 2022-08-26T00:00:00.000Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68360472182aa0cae21ef7a0
Added to database: 5/27/2025, 6:29:06 PM
Last enriched: 7/6/2025, 2:42:44 AM
Last updated: 8/17/2025, 10:42:32 AM
Views: 15
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.