CVE-2022-3005: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yetiforcecompany yetiforcecompany/yetiforcecrm
Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.
AI Analysis
Technical Summary
CVE-2022-3005 is a stored Cross-site Scripting (XSS) vulnerability identified in the yetiforcecompany/yetiforcecrm product, a customer relationship management (CRM) system hosted on GitHub. This vulnerability is classified under CWE-79, which involves improper neutralization of input during web page generation. Specifically, the flaw allows an attacker to inject malicious scripts that are stored on the server and later executed in the context of other users' browsers when they access affected pages. The vulnerability affects versions prior to 6.4.0, although exact affected versions are unspecified. The CVSS 3.0 base score is 5.4, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N) shows that the attack can be performed remotely over the network with low attack complexity, requires privileges (PR:L) but no user interaction, and impacts confidentiality and integrity but not availability. Stored XSS vulnerabilities are particularly dangerous because the malicious payload persists on the server and can affect multiple users, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of victims. No known exploits in the wild have been reported, and no official patches or mitigation links are provided in the data. The vulnerability was published on September 20, 2022, and was reserved on August 26, 2022. The lack of user interaction requirement and the ability to execute arbitrary scripts in users' browsers make this a significant concern for organizations using this CRM platform.
Potential Impact
For European organizations using yetiforcecrm, this vulnerability poses a risk to the confidentiality and integrity of sensitive customer and business data managed within the CRM system. Attackers exploiting this stored XSS flaw could execute malicious scripts in the browsers of employees or partners accessing the CRM, potentially leading to session hijacking, unauthorized data access, or manipulation of CRM records. This could result in data breaches, loss of customer trust, regulatory non-compliance (e.g., GDPR violations), and financial damage. Since CRM systems often contain personal data and business-critical information, exploitation could also facilitate further attacks such as phishing or lateral movement within the corporate network. The medium severity score reflects that while the vulnerability requires some level of privilege, it does not need user interaction, increasing the risk of automated exploitation in environments where users have elevated access. The absence of known exploits in the wild suggests limited active targeting so far, but organizations should not be complacent given the potential impact on confidentiality and integrity.
Mitigation Recommendations
European organizations using yetiforcecrm should prioritize upgrading to version 6.4.0 or later, where this vulnerability is addressed. In the absence of an official patch, organizations should implement strict input validation and output encoding on all user-supplied data within the CRM to neutralize potentially malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the CRM. Regularly audit and sanitize stored data to remove any injected malicious payloads. Limit user privileges within the CRM to the minimum necessary to reduce the risk of exploitation by low-privilege attackers. Monitor web application logs for unusual input patterns or script injection attempts. Additionally, educate users about the risks of XSS and encourage cautious behavior when interacting with CRM content. Network-level protections such as Web Application Firewalls (WAFs) configured to detect and block XSS payloads can provide an additional layer of defense. Finally, ensure that incident response plans include procedures for handling potential XSS exploitation scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Switzerland
CVE-2022-3005: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yetiforcecompany yetiforcecompany/yetiforcecrm
Description
Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.
AI-Powered Analysis
Technical Analysis
CVE-2022-3005 is a stored Cross-site Scripting (XSS) vulnerability identified in the yetiforcecompany/yetiforcecrm product, a customer relationship management (CRM) system hosted on GitHub. This vulnerability is classified under CWE-79, which involves improper neutralization of input during web page generation. Specifically, the flaw allows an attacker to inject malicious scripts that are stored on the server and later executed in the context of other users' browsers when they access affected pages. The vulnerability affects versions prior to 6.4.0, although exact affected versions are unspecified. The CVSS 3.0 base score is 5.4, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N) shows that the attack can be performed remotely over the network with low attack complexity, requires privileges (PR:L) but no user interaction, and impacts confidentiality and integrity but not availability. Stored XSS vulnerabilities are particularly dangerous because the malicious payload persists on the server and can affect multiple users, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of victims. No known exploits in the wild have been reported, and no official patches or mitigation links are provided in the data. The vulnerability was published on September 20, 2022, and was reserved on August 26, 2022. The lack of user interaction requirement and the ability to execute arbitrary scripts in users' browsers make this a significant concern for organizations using this CRM platform.
Potential Impact
For European organizations using yetiforcecrm, this vulnerability poses a risk to the confidentiality and integrity of sensitive customer and business data managed within the CRM system. Attackers exploiting this stored XSS flaw could execute malicious scripts in the browsers of employees or partners accessing the CRM, potentially leading to session hijacking, unauthorized data access, or manipulation of CRM records. This could result in data breaches, loss of customer trust, regulatory non-compliance (e.g., GDPR violations), and financial damage. Since CRM systems often contain personal data and business-critical information, exploitation could also facilitate further attacks such as phishing or lateral movement within the corporate network. The medium severity score reflects that while the vulnerability requires some level of privilege, it does not need user interaction, increasing the risk of automated exploitation in environments where users have elevated access. The absence of known exploits in the wild suggests limited active targeting so far, but organizations should not be complacent given the potential impact on confidentiality and integrity.
Mitigation Recommendations
European organizations using yetiforcecrm should prioritize upgrading to version 6.4.0 or later, where this vulnerability is addressed. In the absence of an official patch, organizations should implement strict input validation and output encoding on all user-supplied data within the CRM to neutralize potentially malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the CRM. Regularly audit and sanitize stored data to remove any injected malicious payloads. Limit user privileges within the CRM to the minimum necessary to reduce the risk of exploitation by low-privilege attackers. Monitor web application logs for unusual input patterns or script injection attempts. Additionally, educate users about the risks of XSS and encourage cautious behavior when interacting with CRM content. Network-level protections such as Web Application Firewalls (WAFs) configured to detect and block XSS payloads can provide an additional layer of defense. Finally, ensure that incident response plans include procedures for handling potential XSS exploitation scenarios.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntrdev
- Date Reserved
- 2022-08-26T00:00:00.000Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68360472182aa0cae21ef7a2
Added to database: 5/27/2025, 6:29:06 PM
Last enriched: 7/6/2025, 2:54:34 AM
Last updated: 7/25/2025, 9:34:21 PM
Views: 10
Related Threats
CVE-2025-54885: CWE-331: Insufficient Entropy in simbo1905 thinbus-srp-npm
MediumCVE-2025-54882: CWE-522: Insufficiently Protected Credentials in himmelblau-idm himmelblau
HighCVE-2025-54799: CWE-319: Cleartext Transmission of Sensitive Information in go-acme lego
LowCVE-2025-54798: CWE-59: Improper Link Resolution Before File Access ('Link Following') in raszi node-tmp
LowCVE-2025-46387: CWE-639 Authorization Bypass Through User-Controlled Key in Emby MediaBrowser
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.