Skip to main content

CVE-2022-31190: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in DSpace DSpace

Medium
Published: Mon Aug 01 2022 (08/01/2022, 20:10:11 UTC)
Source: CVE
Vendor/Project: DSpace
Product: DSpace

Description

DSpace open source software is a repository application which provides durable access to digital resources. dspace-xmlui is a UI component for DSpace. In affected versions metadata on a withdrawn Item is exposed via the XMLUI "mets.xml" object, as long as you know the handle/URL of the withdrawn Item. This vulnerability only impacts the XMLUI. Users are advised to upgrade to version 6.4 or newer.

AI-Powered Analysis

AILast updated: 06/23/2025, 01:06:50 UTC

Technical Analysis

CVE-2022-31190 is a medium-severity vulnerability affecting the DSpace open source repository software, specifically versions from 4.0 up to but not including 6.4. DSpace is widely used for managing and providing durable access to digital resources, often in academic, research, and cultural heritage institutions. The vulnerability resides in the XMLUI component of DSpace, which is responsible for the user interface. When an item in the repository is withdrawn, its metadata should no longer be publicly accessible. However, due to this vulnerability, metadata for withdrawn items remains exposed via the "mets.xml" object accessible through the XMLUI, provided an attacker knows the handle or URL of the withdrawn item. This exposure constitutes an information disclosure flaw categorized under CWE-200, where sensitive information is accessible to unauthorized actors. The vulnerability does not affect other UI components or the core repository functionality, and no authentication or user interaction is required to exploit it, only knowledge of the withdrawn item's handle or URL. No known exploits have been reported in the wild, and the vendor recommends upgrading to version 6.4 or newer to remediate the issue.

Potential Impact

For European organizations, particularly academic institutions, libraries, and cultural heritage repositories that rely on DSpace for digital asset management, this vulnerability poses a risk of unauthorized disclosure of sensitive metadata. Metadata may include descriptive information about withdrawn items that could reveal confidential research data, personal information, or intellectual property that was intended to be removed from public access. Although the core content of withdrawn items is not exposed, metadata leakage can still undermine privacy, confidentiality, and compliance with data protection regulations such as GDPR. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. Since exploitation requires knowledge of the withdrawn item's handle or URL, the scope is limited to items where such information is guessable or previously known. However, given the widespread use of DSpace in European academic and research sectors, the vulnerability could lead to reputational damage and regulatory scrutiny if sensitive metadata is exposed.

Mitigation Recommendations

Organizations should upgrade DSpace installations to version 6.4 or later, where this vulnerability has been addressed. In addition to upgrading, administrators should audit withdrawn items to identify any sensitive metadata that may have been exposed and consider re-withdrawing or sanitizing metadata fields as needed. Access logs should be monitored for unusual requests to "mets.xml" objects of withdrawn items to detect potential reconnaissance or exploitation attempts. If immediate upgrading is not feasible, organizations can implement web application firewall (WAF) rules to block or restrict access to "mets.xml" endpoints for withdrawn items or require authentication for accessing metadata views. Furthermore, organizations should review and tighten URL handle distribution policies to limit exposure of withdrawn item URLs. Regular security assessments and metadata access reviews should be integrated into repository management processes to prevent similar issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-05-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf395d

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/23/2025, 1:06:50 AM

Last updated: 7/28/2025, 5:33:30 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats