CVE-2022-31191: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in DSpace DSpace
DSpace open source software is a repository application which provides durable access to digital resources. dspace-jspui is a UI component for DSpace. The JSPUI spellcheck "Did you mean" HTML escapes the data-spell attribute in the link, but not the actual displayed text. Similarly, the JSPUI autocomplete HTML does not properly escape text passed to it. Both are vulnerable to XSS. This vulnerability only impacts the JSPUI. Users are advised to upgrade. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-31191 is a cross-site scripting (XSS) vulnerability affecting the JSPUI component of DSpace, an open-source repository software widely used for managing and providing durable access to digital resources. The vulnerability arises due to improper neutralization of input during web page generation (CWE-79). Specifically, the JSPUI spellcheck feature's "Did you mean" functionality escapes the data-spell attribute in the HTML link but fails to properly escape the displayed text itself. Similarly, the autocomplete feature in JSPUI does not correctly sanitize or escape user-supplied text before rendering it on the page. This improper handling of input allows an attacker to inject malicious scripts into the web interface, which can then be executed in the context of the victim's browser session. The vulnerability impacts DSpace versions >=4.0 and <5.11 as well as >=6.0 and <6.4, meaning multiple major releases are affected. The issue is confined to the JSPUI component and does not affect other interfaces or components of DSpace. There are no known workarounds, and users are advised to upgrade to patched versions once available. Although no known exploits have been reported in the wild, the vulnerability poses a risk of client-side script injection that can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of authenticated users. The vulnerability requires no authentication or special privileges to exploit, and user interaction is typically needed only to visit a maliciously crafted page or link within the affected DSpace instance. Given the nature of the vulnerability, it primarily threatens the confidentiality and integrity of user sessions and data accessed through the JSPUI interface.
Potential Impact
For European organizations using DSpace, particularly academic institutions, research libraries, and cultural heritage repositories, this vulnerability could lead to unauthorized access to sensitive digital collections or user credentials. Exploitation could allow attackers to execute arbitrary scripts in users' browsers, potentially stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions such as data modification or deletion. This undermines trust in digital repositories and could disrupt access to critical research and cultural data. Since DSpace is widely adopted in European universities and research centers, the impact could be significant in terms of data confidentiality and user privacy. Additionally, compromised user accounts could be leveraged for further attacks within organizational networks. The lack of known exploits in the wild reduces immediate risk, but the medium severity rating and absence of workarounds mean organizations should prioritize remediation to prevent potential exploitation. The vulnerability does not directly affect system availability but could indirectly cause service disruptions if exploited at scale or combined with other attacks.
Mitigation Recommendations
Organizations should promptly upgrade affected DSpace installations to versions beyond 6.4 or 5.11 where this vulnerability is addressed. Until upgrades are applied, administrators should restrict access to the JSPUI interface to trusted users only, using network segmentation or VPNs to limit exposure. Implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Additionally, organizations should audit custom JSPUI extensions or plugins to ensure they do not introduce similar XSS risks. Regularly monitoring web server logs for unusual requests or script injection attempts can provide early detection of exploitation attempts. User education is also important; users should be cautioned against clicking suspicious links within the DSpace environment. Finally, organizations should consider deploying web application firewalls (WAFs) with rules tuned to detect and block typical XSS payloads targeting DSpace JSPUI endpoints.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden, Belgium, Denmark, Finland
CVE-2022-31191: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in DSpace DSpace
Description
DSpace open source software is a repository application which provides durable access to digital resources. dspace-jspui is a UI component for DSpace. The JSPUI spellcheck "Did you mean" HTML escapes the data-spell attribute in the link, but not the actual displayed text. Similarly, the JSPUI autocomplete HTML does not properly escape text passed to it. Both are vulnerable to XSS. This vulnerability only impacts the JSPUI. Users are advised to upgrade. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-31191 is a cross-site scripting (XSS) vulnerability affecting the JSPUI component of DSpace, an open-source repository software widely used for managing and providing durable access to digital resources. The vulnerability arises due to improper neutralization of input during web page generation (CWE-79). Specifically, the JSPUI spellcheck feature's "Did you mean" functionality escapes the data-spell attribute in the HTML link but fails to properly escape the displayed text itself. Similarly, the autocomplete feature in JSPUI does not correctly sanitize or escape user-supplied text before rendering it on the page. This improper handling of input allows an attacker to inject malicious scripts into the web interface, which can then be executed in the context of the victim's browser session. The vulnerability impacts DSpace versions >=4.0 and <5.11 as well as >=6.0 and <6.4, meaning multiple major releases are affected. The issue is confined to the JSPUI component and does not affect other interfaces or components of DSpace. There are no known workarounds, and users are advised to upgrade to patched versions once available. Although no known exploits have been reported in the wild, the vulnerability poses a risk of client-side script injection that can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of authenticated users. The vulnerability requires no authentication or special privileges to exploit, and user interaction is typically needed only to visit a maliciously crafted page or link within the affected DSpace instance. Given the nature of the vulnerability, it primarily threatens the confidentiality and integrity of user sessions and data accessed through the JSPUI interface.
Potential Impact
For European organizations using DSpace, particularly academic institutions, research libraries, and cultural heritage repositories, this vulnerability could lead to unauthorized access to sensitive digital collections or user credentials. Exploitation could allow attackers to execute arbitrary scripts in users' browsers, potentially stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions such as data modification or deletion. This undermines trust in digital repositories and could disrupt access to critical research and cultural data. Since DSpace is widely adopted in European universities and research centers, the impact could be significant in terms of data confidentiality and user privacy. Additionally, compromised user accounts could be leveraged for further attacks within organizational networks. The lack of known exploits in the wild reduces immediate risk, but the medium severity rating and absence of workarounds mean organizations should prioritize remediation to prevent potential exploitation. The vulnerability does not directly affect system availability but could indirectly cause service disruptions if exploited at scale or combined with other attacks.
Mitigation Recommendations
Organizations should promptly upgrade affected DSpace installations to versions beyond 6.4 or 5.11 where this vulnerability is addressed. Until upgrades are applied, administrators should restrict access to the JSPUI interface to trusted users only, using network segmentation or VPNs to limit exposure. Implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Additionally, organizations should audit custom JSPUI extensions or plugins to ensure they do not introduce similar XSS risks. Regularly monitoring web server logs for unusual requests or script injection attempts can provide early detection of exploitation attempts. User education is also important; users should be cautioned against clicking suspicious links within the DSpace environment. Finally, organizations should consider deploying web application firewalls (WAFs) with rules tuned to detect and block typical XSS payloads targeting DSpace JSPUI endpoints.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3961
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/23/2025, 1:06:36 AM
Last updated: 2/7/2026, 4:09:15 PM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.