Skip to main content

CVE-2022-3004: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yetiforcecompany yetiforcecompany/yetiforcecrm

Medium
VulnerabilityCVE-2022-3004cvecve-2022-3004cwe-79
Published: Tue Sep 20 2022 (09/20/2022, 09:40:09 UTC)
Source: CVE Database V5
Vendor/Project: yetiforcecompany
Product: yetiforcecompany/yetiforcecrm

Description

Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.

AI-Powered Analysis

AILast updated: 07/06/2025, 02:42:44 UTC

Technical Analysis

CVE-2022-3004 is a medium-severity stored Cross-site Scripting (XSS) vulnerability identified in the yetiforcecompany/yetiforcecrm product, a Customer Relationship Management (CRM) system hosted on GitHub. The vulnerability is classified under CWE-79, which involves improper neutralization of input during web page generation. This flaw allows an attacker with at least low privileges (PR:L) to inject malicious scripts that are stored persistently within the application and executed in the browsers of users who access the affected pages. The CVSS 3.0 score of 6.3 reflects that the vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L), does not require user interaction (UI:N), and affects confidentiality, integrity, and availability to a limited extent (C:L/I:L/A:L). The vulnerability affects versions prior to 6.4.0, although the exact affected versions are unspecified. Since it is a stored XSS, the malicious payload can be embedded in data fields such as user inputs, comments, or CRM records, which are then rendered without proper sanitization or encoding. This can lead to session hijacking, unauthorized actions performed on behalf of users, defacement, or distribution of malware. No public exploits are currently known in the wild, and no official patches or mitigation links were provided in the source data. However, the presence of this vulnerability in a CRM platform is significant because CRM systems typically handle sensitive customer and business data and are accessed by multiple users with varying privilege levels.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. CRMs are critical business tools that store personal data, contact information, and business intelligence. Exploitation of this XSS vulnerability could lead to unauthorized access to sensitive customer data, manipulation of CRM records, or the spread of malware within the organization’s network. This could result in data breaches violating GDPR requirements, leading to regulatory fines and reputational damage. Furthermore, attackers could leverage the vulnerability to escalate privileges or move laterally within the network, increasing the risk of broader compromise. Since the vulnerability requires at least low privileges but no user interaction, insider threats or compromised low-level accounts could be leveraged to exploit this flaw. The lack of known public exploits suggests limited active exploitation currently, but the risk remains if attackers develop weaponized payloads. European organizations using yetiforcecrm, especially those handling large volumes of personal or sensitive data, should consider this vulnerability a moderate risk that requires timely remediation to maintain compliance and security posture.

Mitigation Recommendations

To mitigate CVE-2022-3004 effectively, organizations should first upgrade yetiforcecrm to version 6.4.0 or later, where this vulnerability is addressed. If immediate upgrade is not feasible, implement strict input validation and output encoding on all user-supplied data fields within the CRM to neutralize potentially malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the CRM. Additionally, enforce the principle of least privilege by limiting user permissions to only what is necessary, reducing the risk of exploitation by low-privileged accounts. Regularly audit CRM logs for suspicious activities indicative of XSS exploitation attempts. Educate users about the risks of XSS and encourage reporting of unusual behavior. Finally, consider deploying Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting the CRM application.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntrdev
Date Reserved
2022-08-26T00:00:00.000Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68360472182aa0cae21ef7a0

Added to database: 5/27/2025, 6:29:06 PM

Last enriched: 7/6/2025, 2:42:44 AM

Last updated: 8/17/2025, 10:42:32 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats