Skip to main content

CVE-2022-31192: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in DSpace DSpace

Medium
Published: Mon Aug 01 2022 (08/01/2022, 20:30:36 UTC)
Source: CVE
Vendor/Project: DSpace
Product: DSpace

Description

DSpace open source software is a repository application which provides durable access to digital resources. dspace-jspui is a UI component for DSpace. The JSPUI "Request a Copy" feature does not properly escape values submitted and stored from the "Request a Copy" form. This means that item requests could be vulnerable to XSS attacks. This vulnerability only impacts the JSPUI. Users are advised to upgrade. There are no known workarounds for this vulnerability.

AI-Powered Analysis

AILast updated: 06/23/2025, 01:06:19 UTC

Technical Analysis

CVE-2022-31192 is a cross-site scripting (XSS) vulnerability affecting the DSpace open source repository software, specifically its JSPUI component. DSpace is widely used for managing and providing durable access to digital resources, commonly in academic, research, and cultural heritage institutions. The vulnerability resides in the "Request a Copy" feature of the JSPUI, where user-supplied input from the request form is not properly escaped or sanitized before being stored and rendered back in the web interface. This improper neutralization of input (classified under CWE-79) allows an attacker to inject malicious scripts that execute in the context of other users' browsers when they view the affected pages. The impacted versions include DSpace releases from 4.0 up to but not including 5.11, and from 6.0 up to but not including 6.4. No known exploits have been reported in the wild, and no workarounds are currently available. The vulnerability is rated as medium severity by the vendor, reflecting the risk of client-side script execution that could lead to session hijacking, credential theft, or other malicious actions targeting users of the repository interface. The issue is limited to the JSPUI component and does not affect other DSpace UI components. Users are advised to upgrade to patched versions once available to mitigate this risk.

Potential Impact

For European organizations, especially universities, research institutions, libraries, and cultural heritage organizations that rely on DSpace for digital repository management, this vulnerability poses a risk to the confidentiality and integrity of user sessions and data. An attacker exploiting this XSS flaw could execute arbitrary JavaScript in the browsers of legitimate users, potentially stealing authentication tokens, redirecting users to malicious sites, or performing actions on their behalf within the repository interface. This could lead to unauthorized access to sensitive research data or user information. While the vulnerability does not directly compromise server-side data or availability, the reputational damage and trust erosion from a successful attack could be significant. Given the widespread adoption of DSpace in Europe, especially in countries with strong academic and research sectors, the impact could be broad if not addressed promptly. The lack of known exploits suggests limited active targeting, but the ease of exploitation inherent to XSS vulnerabilities means that opportunistic attackers could leverage this flaw if left unpatched.

Mitigation Recommendations

Organizations should prioritize upgrading DSpace installations to versions 5.11 or later and 6.4 or later where the vulnerability has been addressed. Until upgrades are applied, administrators should consider restricting access to the JSPUI "Request a Copy" feature to trusted users only, possibly through network segmentation or access control lists, to reduce exposure. Implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting the sources from which scripts can be loaded and executed. Additionally, monitoring web logs for unusual input patterns or script tags in form submissions can provide early detection of attempted exploitation. Training repository administrators and users to recognize phishing or suspicious behaviors related to the repository interface can further reduce risk. Finally, organizations should review their incident response plans to include scenarios involving XSS attacks on web applications to ensure rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-05-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf3967

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/23/2025, 1:06:19 AM

Last updated: 8/13/2025, 12:49:45 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats