CVE-2022-31192: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in DSpace DSpace
DSpace open source software is a repository application which provides durable access to digital resources. dspace-jspui is a UI component for DSpace. The JSPUI "Request a Copy" feature does not properly escape values submitted and stored from the "Request a Copy" form. This means that item requests could be vulnerable to XSS attacks. This vulnerability only impacts the JSPUI. Users are advised to upgrade. There are no known workarounds for this vulnerability.
AI Analysis
Technical Summary
CVE-2022-31192 is a cross-site scripting (XSS) vulnerability affecting the DSpace open source repository software, specifically its JSPUI component. DSpace is widely used for managing and providing durable access to digital resources, commonly in academic, research, and cultural heritage institutions. The vulnerability resides in the "Request a Copy" feature of the JSPUI, where user-supplied input from the request form is not properly escaped or sanitized before being stored and rendered back in the web interface. This improper neutralization of input (classified under CWE-79) allows an attacker to inject malicious scripts that execute in the context of other users' browsers when they view the affected pages. The impacted versions include DSpace releases from 4.0 up to but not including 5.11, and from 6.0 up to but not including 6.4. No known exploits have been reported in the wild, and no workarounds are currently available. The vulnerability is rated as medium severity by the vendor, reflecting the risk of client-side script execution that could lead to session hijacking, credential theft, or other malicious actions targeting users of the repository interface. The issue is limited to the JSPUI component and does not affect other DSpace UI components. Users are advised to upgrade to patched versions once available to mitigate this risk.
Potential Impact
For European organizations, especially universities, research institutions, libraries, and cultural heritage organizations that rely on DSpace for digital repository management, this vulnerability poses a risk to the confidentiality and integrity of user sessions and data. An attacker exploiting this XSS flaw could execute arbitrary JavaScript in the browsers of legitimate users, potentially stealing authentication tokens, redirecting users to malicious sites, or performing actions on their behalf within the repository interface. This could lead to unauthorized access to sensitive research data or user information. While the vulnerability does not directly compromise server-side data or availability, the reputational damage and trust erosion from a successful attack could be significant. Given the widespread adoption of DSpace in Europe, especially in countries with strong academic and research sectors, the impact could be broad if not addressed promptly. The lack of known exploits suggests limited active targeting, but the ease of exploitation inherent to XSS vulnerabilities means that opportunistic attackers could leverage this flaw if left unpatched.
Mitigation Recommendations
Organizations should prioritize upgrading DSpace installations to versions 5.11 or later and 6.4 or later where the vulnerability has been addressed. Until upgrades are applied, administrators should consider restricting access to the JSPUI "Request a Copy" feature to trusted users only, possibly through network segmentation or access control lists, to reduce exposure. Implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting the sources from which scripts can be loaded and executed. Additionally, monitoring web logs for unusual input patterns or script tags in form submissions can provide early detection of attempted exploitation. Training repository administrators and users to recognize phishing or suspicious behaviors related to the repository interface can further reduce risk. Finally, organizations should review their incident response plans to include scenarios involving XSS attacks on web applications to ensure rapid containment and remediation.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden, Belgium, Switzerland, Austria
CVE-2022-31192: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in DSpace DSpace
Description
DSpace open source software is a repository application which provides durable access to digital resources. dspace-jspui is a UI component for DSpace. The JSPUI "Request a Copy" feature does not properly escape values submitted and stored from the "Request a Copy" form. This means that item requests could be vulnerable to XSS attacks. This vulnerability only impacts the JSPUI. Users are advised to upgrade. There are no known workarounds for this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2022-31192 is a cross-site scripting (XSS) vulnerability affecting the DSpace open source repository software, specifically its JSPUI component. DSpace is widely used for managing and providing durable access to digital resources, commonly in academic, research, and cultural heritage institutions. The vulnerability resides in the "Request a Copy" feature of the JSPUI, where user-supplied input from the request form is not properly escaped or sanitized before being stored and rendered back in the web interface. This improper neutralization of input (classified under CWE-79) allows an attacker to inject malicious scripts that execute in the context of other users' browsers when they view the affected pages. The impacted versions include DSpace releases from 4.0 up to but not including 5.11, and from 6.0 up to but not including 6.4. No known exploits have been reported in the wild, and no workarounds are currently available. The vulnerability is rated as medium severity by the vendor, reflecting the risk of client-side script execution that could lead to session hijacking, credential theft, or other malicious actions targeting users of the repository interface. The issue is limited to the JSPUI component and does not affect other DSpace UI components. Users are advised to upgrade to patched versions once available to mitigate this risk.
Potential Impact
For European organizations, especially universities, research institutions, libraries, and cultural heritage organizations that rely on DSpace for digital repository management, this vulnerability poses a risk to the confidentiality and integrity of user sessions and data. An attacker exploiting this XSS flaw could execute arbitrary JavaScript in the browsers of legitimate users, potentially stealing authentication tokens, redirecting users to malicious sites, or performing actions on their behalf within the repository interface. This could lead to unauthorized access to sensitive research data or user information. While the vulnerability does not directly compromise server-side data or availability, the reputational damage and trust erosion from a successful attack could be significant. Given the widespread adoption of DSpace in Europe, especially in countries with strong academic and research sectors, the impact could be broad if not addressed promptly. The lack of known exploits suggests limited active targeting, but the ease of exploitation inherent to XSS vulnerabilities means that opportunistic attackers could leverage this flaw if left unpatched.
Mitigation Recommendations
Organizations should prioritize upgrading DSpace installations to versions 5.11 or later and 6.4 or later where the vulnerability has been addressed. Until upgrades are applied, administrators should consider restricting access to the JSPUI "Request a Copy" feature to trusted users only, possibly through network segmentation or access control lists, to reduce exposure. Implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting the sources from which scripts can be loaded and executed. Additionally, monitoring web logs for unusual input patterns or script tags in form submissions can provide early detection of attempted exploitation. Training repository administrators and users to recognize phishing or suspicious behaviors related to the repository interface can further reduce risk. Finally, organizations should review their incident response plans to include scenarios involving XSS attacks on web applications to ensure rapid containment and remediation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3967
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/23/2025, 1:06:19 AM
Last updated: 8/13/2025, 12:49:45 PM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.