Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-3005: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yetiforcecompany yetiforcecompany/yetiforcecrm

0
Medium
VulnerabilityCVE-2022-3005cvecve-2022-3005cwe-79
Published: Tue Sep 20 2022 (09/20/2022, 10:15:26 UTC)
Source: CVE Database V5
Vendor/Project: yetiforcecompany
Product: yetiforcecompany/yetiforcecrm

Description

Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.

AI-Powered Analysis

AILast updated: 07/06/2025, 02:54:34 UTC

Technical Analysis

CVE-2022-3005 is a stored Cross-site Scripting (XSS) vulnerability identified in the yetiforcecompany/yetiforcecrm product, a customer relationship management (CRM) system hosted on GitHub. This vulnerability is classified under CWE-79, which involves improper neutralization of input during web page generation. Specifically, the flaw allows an attacker to inject malicious scripts that are stored on the server and later executed in the context of other users' browsers when they access affected pages. The vulnerability affects versions prior to 6.4.0, although exact affected versions are unspecified. The CVSS 3.0 base score is 5.4, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N) shows that the attack can be performed remotely over the network with low attack complexity, requires privileges (PR:L) but no user interaction, and impacts confidentiality and integrity but not availability. Stored XSS vulnerabilities are particularly dangerous because the malicious payload persists on the server and can affect multiple users, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of victims. No known exploits in the wild have been reported, and no official patches or mitigation links are provided in the data. The vulnerability was published on September 20, 2022, and was reserved on August 26, 2022. The lack of user interaction requirement and the ability to execute arbitrary scripts in users' browsers make this a significant concern for organizations using this CRM platform.

Potential Impact

For European organizations using yetiforcecrm, this vulnerability poses a risk to the confidentiality and integrity of sensitive customer and business data managed within the CRM system. Attackers exploiting this stored XSS flaw could execute malicious scripts in the browsers of employees or partners accessing the CRM, potentially leading to session hijacking, unauthorized data access, or manipulation of CRM records. This could result in data breaches, loss of customer trust, regulatory non-compliance (e.g., GDPR violations), and financial damage. Since CRM systems often contain personal data and business-critical information, exploitation could also facilitate further attacks such as phishing or lateral movement within the corporate network. The medium severity score reflects that while the vulnerability requires some level of privilege, it does not need user interaction, increasing the risk of automated exploitation in environments where users have elevated access. The absence of known exploits in the wild suggests limited active targeting so far, but organizations should not be complacent given the potential impact on confidentiality and integrity.

Mitigation Recommendations

European organizations using yetiforcecrm should prioritize upgrading to version 6.4.0 or later, where this vulnerability is addressed. In the absence of an official patch, organizations should implement strict input validation and output encoding on all user-supplied data within the CRM to neutralize potentially malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the CRM. Regularly audit and sanitize stored data to remove any injected malicious payloads. Limit user privileges within the CRM to the minimum necessary to reduce the risk of exploitation by low-privilege attackers. Monitor web application logs for unusual input patterns or script injection attempts. Additionally, educate users about the risks of XSS and encourage cautious behavior when interacting with CRM content. Network-level protections such as Web Application Firewalls (WAFs) configured to detect and block XSS payloads can provide an additional layer of defense. Finally, ensure that incident response plans include procedures for handling potential XSS exploitation scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
@huntrdev
Date Reserved
2022-08-26T00:00:00.000Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68360472182aa0cae21ef7a2

Added to database: 5/27/2025, 6:29:06 PM

Last enriched: 7/6/2025, 2:54:34 AM

Last updated: 2/7/2026, 7:14:54 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats