CVE-2022-32167: CWE-79 Cross-site Scripting (XSS) in Cloudreve Cloudreve
Cloudreve versions v1.0.0 through v3.5.3 are vulnerable to Stored Cross-Site Scripting (XSS), via the file upload functionality. A low privileged user will be able to share a file with an admin user, which could lead to privilege escalation.
AI Analysis
Technical Summary
CVE-2022-32167 is a medium severity Stored Cross-Site Scripting (XSS) vulnerability affecting Cloudreve versions from v1.0.0 through v3.5.3. Cloudreve is a cloud storage system that allows users to upload and share files. The vulnerability arises from insufficient sanitization of user-supplied input in the file upload functionality. Specifically, a low-privileged user can upload a crafted file or metadata that contains malicious JavaScript code. When an administrator or higher-privileged user views or interacts with this file, the stored malicious script executes in their browser context. This can lead to privilege escalation by hijacking admin sessions, stealing authentication tokens, or performing unauthorized actions on behalf of the admin user. The CVSS 3.1 score of 5.4 reflects that the attack vector is network-based, requires low privileges, and user interaction (admin viewing the file) is necessary. The scope is changed, indicating that the vulnerability affects components beyond the initially compromised user context. The impact includes limited confidentiality and integrity loss but no availability impact. No known exploits in the wild have been reported yet, and no official patches are linked in the provided data, suggesting users should verify updates from the vendor. This vulnerability is categorized under CWE-79, which is a common web application security issue related to improper input validation and output encoding leading to XSS.
Potential Impact
For European organizations using Cloudreve for internal or external cloud storage services, this vulnerability poses a risk of privilege escalation and potential compromise of administrative accounts. Successful exploitation could allow attackers to execute arbitrary scripts in the context of admin users, leading to unauthorized access to sensitive files, modification of stored data, or further lateral movement within the organization’s infrastructure. This is particularly concerning for organizations handling sensitive or regulated data under GDPR, as unauthorized access or data manipulation could result in compliance violations and reputational damage. Since the vulnerability requires an admin to interact with the malicious file, organizations with multiple administrators or collaborative file sharing workflows are at higher risk. The attack could be leveraged in targeted phishing or social engineering campaigns within the organization to trick admins into triggering the exploit. Although no active exploits are reported, the presence of this vulnerability in a cloud storage platform used in Europe could attract attackers aiming to compromise cloud services and gain footholds in enterprise environments.
Mitigation Recommendations
European organizations should immediately audit their Cloudreve deployments to identify affected versions (v1.0.0 through v3.5.3). Until an official patch is available, implement strict input validation and output encoding on file metadata and names to neutralize potential scripts. Restrict file sharing permissions to trusted users and limit admin interactions with files uploaded by low-privileged users. Employ Content Security Policy (CSP) headers to reduce the impact of XSS by restricting script execution sources. Monitor admin activities and logs for unusual behavior or access patterns. Educate administrators about the risk of interacting with untrusted files and encourage caution when reviewing shared content. Consider isolating the Cloudreve admin interface within a secure network segment or VPN to reduce exposure. Regularly check for vendor updates or security advisories and apply patches promptly once released. Additionally, implement multi-factor authentication for admin accounts to mitigate session hijacking risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2022-32167: CWE-79 Cross-site Scripting (XSS) in Cloudreve Cloudreve
Description
Cloudreve versions v1.0.0 through v3.5.3 are vulnerable to Stored Cross-Site Scripting (XSS), via the file upload functionality. A low privileged user will be able to share a file with an admin user, which could lead to privilege escalation.
AI-Powered Analysis
Technical Analysis
CVE-2022-32167 is a medium severity Stored Cross-Site Scripting (XSS) vulnerability affecting Cloudreve versions from v1.0.0 through v3.5.3. Cloudreve is a cloud storage system that allows users to upload and share files. The vulnerability arises from insufficient sanitization of user-supplied input in the file upload functionality. Specifically, a low-privileged user can upload a crafted file or metadata that contains malicious JavaScript code. When an administrator or higher-privileged user views or interacts with this file, the stored malicious script executes in their browser context. This can lead to privilege escalation by hijacking admin sessions, stealing authentication tokens, or performing unauthorized actions on behalf of the admin user. The CVSS 3.1 score of 5.4 reflects that the attack vector is network-based, requires low privileges, and user interaction (admin viewing the file) is necessary. The scope is changed, indicating that the vulnerability affects components beyond the initially compromised user context. The impact includes limited confidentiality and integrity loss but no availability impact. No known exploits in the wild have been reported yet, and no official patches are linked in the provided data, suggesting users should verify updates from the vendor. This vulnerability is categorized under CWE-79, which is a common web application security issue related to improper input validation and output encoding leading to XSS.
Potential Impact
For European organizations using Cloudreve for internal or external cloud storage services, this vulnerability poses a risk of privilege escalation and potential compromise of administrative accounts. Successful exploitation could allow attackers to execute arbitrary scripts in the context of admin users, leading to unauthorized access to sensitive files, modification of stored data, or further lateral movement within the organization’s infrastructure. This is particularly concerning for organizations handling sensitive or regulated data under GDPR, as unauthorized access or data manipulation could result in compliance violations and reputational damage. Since the vulnerability requires an admin to interact with the malicious file, organizations with multiple administrators or collaborative file sharing workflows are at higher risk. The attack could be leveraged in targeted phishing or social engineering campaigns within the organization to trick admins into triggering the exploit. Although no active exploits are reported, the presence of this vulnerability in a cloud storage platform used in Europe could attract attackers aiming to compromise cloud services and gain footholds in enterprise environments.
Mitigation Recommendations
European organizations should immediately audit their Cloudreve deployments to identify affected versions (v1.0.0 through v3.5.3). Until an official patch is available, implement strict input validation and output encoding on file metadata and names to neutralize potential scripts. Restrict file sharing permissions to trusted users and limit admin interactions with files uploaded by low-privileged users. Employ Content Security Policy (CSP) headers to reduce the impact of XSS by restricting script execution sources. Monitor admin activities and logs for unusual behavior or access patterns. Educate administrators about the risk of interacting with untrusted files and encourage caution when reviewing shared content. Consider isolating the Cloudreve admin interface within a secure network segment or VPN to reduce exposure. Regularly check for vendor updates or security advisories and apply patches promptly once released. Additionally, implement multi-factor authentication for admin accounts to mitigate session hijacking risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Mend
- Date Reserved
- 2022-05-31T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68386826182aa0cae2801b4f
Added to database: 5/29/2025, 1:59:02 PM
Last enriched: 7/8/2025, 2:42:59 AM
Last updated: 8/18/2025, 11:31:56 PM
Views: 15
Related Threats
CVE-2025-43739: CWE-203 Observable Discrepancy in Liferay Portal
MediumCVE-2025-8218: CWE-269 Improper Privilege Management in imithemes Real Spaces - WordPress Properties Directory Theme
HighCVE-2025-6758: CWE-269 Improper Privilege Management in imithemes Real Spaces - WordPress Properties Directory Theme
CriticalCVE-2025-54336: n/a
CriticalCVE-2025-9140: SQL Injection in Shanghai Lingdang Information Technology Lingdang CRM
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.