CVE-2022-31193: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in DSpace DSpace
DSpace open source software is a repository application which provides durable access to digital resources. dspace-jspui is a UI component for DSpace. The JSPUI controlled vocabulary servlet is vulnerable to an open redirect attack, where an attacker can craft a malicious URL that looks like a legitimate DSpace/repository URL. When that URL is clicked by the target, it redirects them to a site of the attacker's choice. This issue has been patched in versions 5.11 and 6.4. Users are advised to upgrade. There are no known workaround for this vulnerability.
AI Analysis
Technical Summary
CVE-2022-31193 is a security vulnerability classified as an open redirect (CWE-601) found in the DSpace open source repository software, specifically within the dspace-jspui user interface component. DSpace is widely used for managing and providing durable access to digital resources, often in academic, research, and cultural heritage institutions. The vulnerability exists in the JSPUI controlled vocabulary servlet, which improperly handles URL redirection parameters. An attacker can craft a malicious URL that appears to originate from a legitimate DSpace repository URL but actually redirects users to an attacker-controlled external site. This can be exploited by tricking users into clicking such URLs, potentially leading to phishing attacks, credential theft, or distribution of malware. The vulnerability affects DSpace versions from 4.0 up to but not including 5.11, and from 6.0 up to but not including 6.4. The issue has been addressed in versions 5.11 and 6.4, and users are strongly advised to upgrade to these or later versions. There are no known workarounds for this vulnerability, and no public exploits have been reported in the wild to date. The vulnerability does not require authentication or user privileges to be exploited, but it does require user interaction in the form of clicking a malicious link. The flaw impacts the integrity of the URL redirection process and can indirectly affect confidentiality and availability through subsequent social engineering attacks. Given the nature of the vulnerability, it primarily serves as an enabler for further attacks rather than causing direct system compromise or denial of service.
Potential Impact
For European organizations, especially those in academia, research, libraries, and cultural institutions that rely on DSpace for digital repository management, this vulnerability poses a significant risk. Attackers could exploit the open redirect to conduct phishing campaigns targeting users of these repositories, potentially harvesting credentials or distributing malware under the guise of trusted URLs. This could lead to unauthorized access to sensitive research data or intellectual property, reputational damage, and compliance issues with data protection regulations such as GDPR. The indirect nature of the attack means that while the core system may not be directly compromised, the user base and associated data could be at risk. Additionally, given the collaborative and open nature of many European research projects, a successful attack could have cascading effects across multiple institutions. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation, especially as threat actors often leverage open redirect vulnerabilities in targeted phishing and social engineering campaigns.
Mitigation Recommendations
The primary and most effective mitigation is to upgrade affected DSpace installations to version 5.11 or 6.4 and above, where the vulnerability has been patched. Organizations should prioritize patching in environments exposed to external users or integrated with public-facing services. In the absence of immediate upgrade capability, organizations should implement strict URL filtering and validation on any user-generated or external links referencing DSpace repositories to detect and block suspicious redirect URLs. Additionally, security awareness training should be enhanced to educate users about the risks of clicking on unexpected or suspicious links, especially those purporting to be from trusted repositories. Monitoring web server logs for unusual redirect patterns or spikes in URL redirection activity can help detect attempted exploitation. Web application firewalls (WAFs) can be configured with custom rules to detect and block open redirect attempts targeting the JSPUI controlled vocabulary servlet endpoints. Finally, organizations should review and tighten access controls and authentication mechanisms around their DSpace instances to limit exposure.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden, Belgium, Finland, Denmark
CVE-2022-31193: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in DSpace DSpace
Description
DSpace open source software is a repository application which provides durable access to digital resources. dspace-jspui is a UI component for DSpace. The JSPUI controlled vocabulary servlet is vulnerable to an open redirect attack, where an attacker can craft a malicious URL that looks like a legitimate DSpace/repository URL. When that URL is clicked by the target, it redirects them to a site of the attacker's choice. This issue has been patched in versions 5.11 and 6.4. Users are advised to upgrade. There are no known workaround for this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2022-31193 is a security vulnerability classified as an open redirect (CWE-601) found in the DSpace open source repository software, specifically within the dspace-jspui user interface component. DSpace is widely used for managing and providing durable access to digital resources, often in academic, research, and cultural heritage institutions. The vulnerability exists in the JSPUI controlled vocabulary servlet, which improperly handles URL redirection parameters. An attacker can craft a malicious URL that appears to originate from a legitimate DSpace repository URL but actually redirects users to an attacker-controlled external site. This can be exploited by tricking users into clicking such URLs, potentially leading to phishing attacks, credential theft, or distribution of malware. The vulnerability affects DSpace versions from 4.0 up to but not including 5.11, and from 6.0 up to but not including 6.4. The issue has been addressed in versions 5.11 and 6.4, and users are strongly advised to upgrade to these or later versions. There are no known workarounds for this vulnerability, and no public exploits have been reported in the wild to date. The vulnerability does not require authentication or user privileges to be exploited, but it does require user interaction in the form of clicking a malicious link. The flaw impacts the integrity of the URL redirection process and can indirectly affect confidentiality and availability through subsequent social engineering attacks. Given the nature of the vulnerability, it primarily serves as an enabler for further attacks rather than causing direct system compromise or denial of service.
Potential Impact
For European organizations, especially those in academia, research, libraries, and cultural institutions that rely on DSpace for digital repository management, this vulnerability poses a significant risk. Attackers could exploit the open redirect to conduct phishing campaigns targeting users of these repositories, potentially harvesting credentials or distributing malware under the guise of trusted URLs. This could lead to unauthorized access to sensitive research data or intellectual property, reputational damage, and compliance issues with data protection regulations such as GDPR. The indirect nature of the attack means that while the core system may not be directly compromised, the user base and associated data could be at risk. Additionally, given the collaborative and open nature of many European research projects, a successful attack could have cascading effects across multiple institutions. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation, especially as threat actors often leverage open redirect vulnerabilities in targeted phishing and social engineering campaigns.
Mitigation Recommendations
The primary and most effective mitigation is to upgrade affected DSpace installations to version 5.11 or 6.4 and above, where the vulnerability has been patched. Organizations should prioritize patching in environments exposed to external users or integrated with public-facing services. In the absence of immediate upgrade capability, organizations should implement strict URL filtering and validation on any user-generated or external links referencing DSpace repositories to detect and block suspicious redirect URLs. Additionally, security awareness training should be enhanced to educate users about the risks of clicking on unexpected or suspicious links, especially those purporting to be from trusted repositories. Monitoring web server logs for unusual redirect patterns or spikes in URL redirection activity can help detect attempted exploitation. Web application firewalls (WAFs) can be configured with custom rules to detect and block open redirect attempts targeting the JSPUI controlled vocabulary servlet endpoints. Finally, organizations should review and tighten access controls and authentication mechanisms around their DSpace instances to limit exposure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf396b
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/23/2025, 1:06:02 AM
Last updated: 8/11/2025, 6:04:12 PM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.