Skip to main content

CVE-2022-3005: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yetiforcecompany yetiforcecompany/yetiforcecrm

Medium
VulnerabilityCVE-2022-3005cvecve-2022-3005cwe-79
Published: Tue Sep 20 2022 (09/20/2022, 10:15:26 UTC)
Source: CVE Database V5
Vendor/Project: yetiforcecompany
Product: yetiforcecompany/yetiforcecrm

Description

Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.

AI-Powered Analysis

AILast updated: 07/06/2025, 02:54:34 UTC

Technical Analysis

CVE-2022-3005 is a stored Cross-site Scripting (XSS) vulnerability identified in the yetiforcecompany/yetiforcecrm product, a customer relationship management (CRM) system hosted on GitHub. This vulnerability is classified under CWE-79, which involves improper neutralization of input during web page generation. Specifically, the flaw allows an attacker to inject malicious scripts that are stored on the server and later executed in the context of other users' browsers when they access affected pages. The vulnerability affects versions prior to 6.4.0, although exact affected versions are unspecified. The CVSS 3.0 base score is 5.4, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N) shows that the attack can be performed remotely over the network with low attack complexity, requires privileges (PR:L) but no user interaction, and impacts confidentiality and integrity but not availability. Stored XSS vulnerabilities are particularly dangerous because the malicious payload persists on the server and can affect multiple users, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of victims. No known exploits in the wild have been reported, and no official patches or mitigation links are provided in the data. The vulnerability was published on September 20, 2022, and was reserved on August 26, 2022. The lack of user interaction requirement and the ability to execute arbitrary scripts in users' browsers make this a significant concern for organizations using this CRM platform.

Potential Impact

For European organizations using yetiforcecrm, this vulnerability poses a risk to the confidentiality and integrity of sensitive customer and business data managed within the CRM system. Attackers exploiting this stored XSS flaw could execute malicious scripts in the browsers of employees or partners accessing the CRM, potentially leading to session hijacking, unauthorized data access, or manipulation of CRM records. This could result in data breaches, loss of customer trust, regulatory non-compliance (e.g., GDPR violations), and financial damage. Since CRM systems often contain personal data and business-critical information, exploitation could also facilitate further attacks such as phishing or lateral movement within the corporate network. The medium severity score reflects that while the vulnerability requires some level of privilege, it does not need user interaction, increasing the risk of automated exploitation in environments where users have elevated access. The absence of known exploits in the wild suggests limited active targeting so far, but organizations should not be complacent given the potential impact on confidentiality and integrity.

Mitigation Recommendations

European organizations using yetiforcecrm should prioritize upgrading to version 6.4.0 or later, where this vulnerability is addressed. In the absence of an official patch, organizations should implement strict input validation and output encoding on all user-supplied data within the CRM to neutralize potentially malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the CRM. Regularly audit and sanitize stored data to remove any injected malicious payloads. Limit user privileges within the CRM to the minimum necessary to reduce the risk of exploitation by low-privilege attackers. Monitor web application logs for unusual input patterns or script injection attempts. Additionally, educate users about the risks of XSS and encourage cautious behavior when interacting with CRM content. Network-level protections such as Web Application Firewalls (WAFs) configured to detect and block XSS payloads can provide an additional layer of defense. Finally, ensure that incident response plans include procedures for handling potential XSS exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntrdev
Date Reserved
2022-08-26T00:00:00.000Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68360472182aa0cae21ef7a2

Added to database: 5/27/2025, 6:29:06 PM

Last enriched: 7/6/2025, 2:54:34 AM

Last updated: 7/25/2025, 9:34:21 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats