CVE-2022-31136: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bookwyrm-social bookwyrm
Bookwyrm is an open source social reading and reviewing program. Versions of Bookwyrm prior to 0.4.1 did not properly sanitize html being rendered to users. Unprivileged users are able to inject scripts into user profiles, book descriptions, and statuses. These vulnerabilities may be exploited as cross site scripting attacks on users viewing these fields. Users are advised to upgrade to version 0.4.1. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-31136 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting versions of the open-source social reading and reviewing platform Bookwyrm prior to 0.4.1. The vulnerability arises from improper neutralization of user-supplied HTML input during web page generation. Specifically, unprivileged users can inject malicious scripts into various user-facing fields such as user profiles, book descriptions, and status updates. When other users view these fields, the injected scripts execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim user. The vulnerability does not require elevated privileges to exploit, nor does it require user interaction beyond viewing the affected content. Although no known exploits have been reported in the wild, the lack of input sanitization represents a significant risk to the confidentiality and integrity of user data within the Bookwyrm platform. The vendor has addressed the issue in version 0.4.1, and users are strongly advised to upgrade. No effective workarounds exist, making patching the primary mitigation strategy.
Potential Impact
For European organizations using Bookwyrm, especially those leveraging it for community engagement, book clubs, or educational purposes, this vulnerability could lead to unauthorized script execution within user browsers. This can result in theft of session cookies, enabling attackers to impersonate users, access private information, or perform actions with the victim’s privileges. The impact extends to reputational damage if user data is compromised or if malicious content is propagated through the platform. Given Bookwyrm’s open-source nature and potential deployment in academic and cultural institutions across Europe, exploitation could disrupt user trust and platform availability. While the vulnerability does not directly compromise backend systems, the exploitation of user sessions can lead to further attacks or data leakage. The absence of known exploits reduces immediate risk, but the ease of exploitation and lack of workarounds elevate the threat level.
Mitigation Recommendations
The primary and most effective mitigation is to upgrade all Bookwyrm instances to version 0.4.1 or later, where proper input sanitization has been implemented. Organizations should audit their current deployments to identify affected versions and prioritize patching. Additionally, administrators should implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts, which can help mitigate the impact of any residual or undiscovered XSS vectors. Regular security training for users to recognize suspicious content and avoid clicking on unexpected links can reduce the risk of secondary attacks. Monitoring web application logs for unusual input patterns or script injections can help detect attempted exploitation. Finally, organizations should consider isolating Bookwyrm deployments within secure network segments and enforcing strict access controls to limit exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2022-31136: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bookwyrm-social bookwyrm
Description
Bookwyrm is an open source social reading and reviewing program. Versions of Bookwyrm prior to 0.4.1 did not properly sanitize html being rendered to users. Unprivileged users are able to inject scripts into user profiles, book descriptions, and statuses. These vulnerabilities may be exploited as cross site scripting attacks on users viewing these fields. Users are advised to upgrade to version 0.4.1. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-31136 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting versions of the open-source social reading and reviewing platform Bookwyrm prior to 0.4.1. The vulnerability arises from improper neutralization of user-supplied HTML input during web page generation. Specifically, unprivileged users can inject malicious scripts into various user-facing fields such as user profiles, book descriptions, and status updates. When other users view these fields, the injected scripts execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim user. The vulnerability does not require elevated privileges to exploit, nor does it require user interaction beyond viewing the affected content. Although no known exploits have been reported in the wild, the lack of input sanitization represents a significant risk to the confidentiality and integrity of user data within the Bookwyrm platform. The vendor has addressed the issue in version 0.4.1, and users are strongly advised to upgrade. No effective workarounds exist, making patching the primary mitigation strategy.
Potential Impact
For European organizations using Bookwyrm, especially those leveraging it for community engagement, book clubs, or educational purposes, this vulnerability could lead to unauthorized script execution within user browsers. This can result in theft of session cookies, enabling attackers to impersonate users, access private information, or perform actions with the victim’s privileges. The impact extends to reputational damage if user data is compromised or if malicious content is propagated through the platform. Given Bookwyrm’s open-source nature and potential deployment in academic and cultural institutions across Europe, exploitation could disrupt user trust and platform availability. While the vulnerability does not directly compromise backend systems, the exploitation of user sessions can lead to further attacks or data leakage. The absence of known exploits reduces immediate risk, but the ease of exploitation and lack of workarounds elevate the threat level.
Mitigation Recommendations
The primary and most effective mitigation is to upgrade all Bookwyrm instances to version 0.4.1 or later, where proper input sanitization has been implemented. Organizations should audit their current deployments to identify affected versions and prioritize patching. Additionally, administrators should implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts, which can help mitigate the impact of any residual or undiscovered XSS vectors. Regular security training for users to recognize suspicious content and avoid clicking on unexpected links can reduce the risk of secondary attacks. Monitoring web application logs for unusual input patterns or script injections can help detect attempted exploitation. Finally, organizations should consider isolating Bookwyrm deployments within secure network segments and enforcing strict access controls to limit exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3716
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/23/2025, 2:51:05 AM
Last updated: 7/31/2025, 7:01:53 PM
Views: 15
Related Threats
CVE-2025-8708: Deserialization in Antabot White-Jotter
LowCVE-2025-8707: Improper Export of Android Application Components in Huuge Box App
MediumCVE-2025-8706: SQL Injection in Wanzhou WOES Intelligent Optimization Energy Saving System
MediumCVE-2025-8705: SQL Injection in Wanzhou WOES Intelligent Optimization Energy Saving System
MediumCVE-2025-8704: SQL Injection in Wanzhou WOES Intelligent Optimization Energy Saving System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.