CVE-2022-31191: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in DSpace DSpace
DSpace open source software is a repository application which provides durable access to digital resources. dspace-jspui is a UI component for DSpace. The JSPUI spellcheck "Did you mean" HTML escapes the data-spell attribute in the link, but not the actual displayed text. Similarly, the JSPUI autocomplete HTML does not properly escape text passed to it. Both are vulnerable to XSS. This vulnerability only impacts the JSPUI. Users are advised to upgrade. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-31191 is a cross-site scripting (XSS) vulnerability affecting the JSPUI component of DSpace, an open-source repository software widely used for managing and providing durable access to digital resources. The vulnerability arises due to improper neutralization of input during web page generation (CWE-79). Specifically, the JSPUI spellcheck feature's "Did you mean" functionality escapes the data-spell attribute in the HTML link but fails to properly escape the displayed text itself. Similarly, the autocomplete feature in JSPUI does not correctly sanitize or escape user-supplied text before rendering it on the page. This improper handling of input allows an attacker to inject malicious scripts into the web interface, which can then be executed in the context of the victim's browser session. The vulnerability impacts DSpace versions >=4.0 and <5.11 as well as >=6.0 and <6.4, meaning multiple major releases are affected. The issue is confined to the JSPUI component and does not affect other interfaces or components of DSpace. There are no known workarounds, and users are advised to upgrade to patched versions once available. Although no known exploits have been reported in the wild, the vulnerability poses a risk of client-side script injection that can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of authenticated users. The vulnerability requires no authentication or special privileges to exploit, and user interaction is typically needed only to visit a maliciously crafted page or link within the affected DSpace instance. Given the nature of the vulnerability, it primarily threatens the confidentiality and integrity of user sessions and data accessed through the JSPUI interface.
Potential Impact
For European organizations using DSpace, particularly academic institutions, research libraries, and cultural heritage repositories, this vulnerability could lead to unauthorized access to sensitive digital collections or user credentials. Exploitation could allow attackers to execute arbitrary scripts in users' browsers, potentially stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions such as data modification or deletion. This undermines trust in digital repositories and could disrupt access to critical research and cultural data. Since DSpace is widely adopted in European universities and research centers, the impact could be significant in terms of data confidentiality and user privacy. Additionally, compromised user accounts could be leveraged for further attacks within organizational networks. The lack of known exploits in the wild reduces immediate risk, but the medium severity rating and absence of workarounds mean organizations should prioritize remediation to prevent potential exploitation. The vulnerability does not directly affect system availability but could indirectly cause service disruptions if exploited at scale or combined with other attacks.
Mitigation Recommendations
Organizations should promptly upgrade affected DSpace installations to versions beyond 6.4 or 5.11 where this vulnerability is addressed. Until upgrades are applied, administrators should restrict access to the JSPUI interface to trusted users only, using network segmentation or VPNs to limit exposure. Implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Additionally, organizations should audit custom JSPUI extensions or plugins to ensure they do not introduce similar XSS risks. Regularly monitoring web server logs for unusual requests or script injection attempts can provide early detection of exploitation attempts. User education is also important; users should be cautioned against clicking suspicious links within the DSpace environment. Finally, organizations should consider deploying web application firewalls (WAFs) with rules tuned to detect and block typical XSS payloads targeting DSpace JSPUI endpoints.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden, Belgium, Denmark, Finland
CVE-2022-31191: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in DSpace DSpace
Description
DSpace open source software is a repository application which provides durable access to digital resources. dspace-jspui is a UI component for DSpace. The JSPUI spellcheck "Did you mean" HTML escapes the data-spell attribute in the link, but not the actual displayed text. Similarly, the JSPUI autocomplete HTML does not properly escape text passed to it. Both are vulnerable to XSS. This vulnerability only impacts the JSPUI. Users are advised to upgrade. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-31191 is a cross-site scripting (XSS) vulnerability affecting the JSPUI component of DSpace, an open-source repository software widely used for managing and providing durable access to digital resources. The vulnerability arises due to improper neutralization of input during web page generation (CWE-79). Specifically, the JSPUI spellcheck feature's "Did you mean" functionality escapes the data-spell attribute in the HTML link but fails to properly escape the displayed text itself. Similarly, the autocomplete feature in JSPUI does not correctly sanitize or escape user-supplied text before rendering it on the page. This improper handling of input allows an attacker to inject malicious scripts into the web interface, which can then be executed in the context of the victim's browser session. The vulnerability impacts DSpace versions >=4.0 and <5.11 as well as >=6.0 and <6.4, meaning multiple major releases are affected. The issue is confined to the JSPUI component and does not affect other interfaces or components of DSpace. There are no known workarounds, and users are advised to upgrade to patched versions once available. Although no known exploits have been reported in the wild, the vulnerability poses a risk of client-side script injection that can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of authenticated users. The vulnerability requires no authentication or special privileges to exploit, and user interaction is typically needed only to visit a maliciously crafted page or link within the affected DSpace instance. Given the nature of the vulnerability, it primarily threatens the confidentiality and integrity of user sessions and data accessed through the JSPUI interface.
Potential Impact
For European organizations using DSpace, particularly academic institutions, research libraries, and cultural heritage repositories, this vulnerability could lead to unauthorized access to sensitive digital collections or user credentials. Exploitation could allow attackers to execute arbitrary scripts in users' browsers, potentially stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions such as data modification or deletion. This undermines trust in digital repositories and could disrupt access to critical research and cultural data. Since DSpace is widely adopted in European universities and research centers, the impact could be significant in terms of data confidentiality and user privacy. Additionally, compromised user accounts could be leveraged for further attacks within organizational networks. The lack of known exploits in the wild reduces immediate risk, but the medium severity rating and absence of workarounds mean organizations should prioritize remediation to prevent potential exploitation. The vulnerability does not directly affect system availability but could indirectly cause service disruptions if exploited at scale or combined with other attacks.
Mitigation Recommendations
Organizations should promptly upgrade affected DSpace installations to versions beyond 6.4 or 5.11 where this vulnerability is addressed. Until upgrades are applied, administrators should restrict access to the JSPUI interface to trusted users only, using network segmentation or VPNs to limit exposure. Implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Additionally, organizations should audit custom JSPUI extensions or plugins to ensure they do not introduce similar XSS risks. Regularly monitoring web server logs for unusual requests or script injection attempts can provide early detection of exploitation attempts. User education is also important; users should be cautioned against clicking suspicious links within the DSpace environment. Finally, organizations should consider deploying web application firewalls (WAFs) with rules tuned to detect and block typical XSS payloads targeting DSpace JSPUI endpoints.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3961
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/23/2025, 1:06:36 AM
Last updated: 8/11/2025, 4:47:30 AM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.