Skip to main content

CVE-2022-32167: CWE-79 Cross-site Scripting (XSS) in Cloudreve Cloudreve

Medium
VulnerabilityCVE-2022-32167cvecve-2022-32167cwe-79
Published: Tue Sep 20 2022 (09/20/2022, 14:45:19 UTC)
Source: CVE Database V5
Vendor/Project: Cloudreve
Product: Cloudreve

Description

Cloudreve versions v1.0.0 through v3.5.3 are vulnerable to Stored Cross-Site Scripting (XSS), via the file upload functionality. A low privileged user will be able to share a file with an admin user, which could lead to privilege escalation.

AI-Powered Analysis

AILast updated: 07/08/2025, 02:42:59 UTC

Technical Analysis

CVE-2022-32167 is a medium severity Stored Cross-Site Scripting (XSS) vulnerability affecting Cloudreve versions from v1.0.0 through v3.5.3. Cloudreve is a cloud storage system that allows users to upload and share files. The vulnerability arises from insufficient sanitization of user-supplied input in the file upload functionality. Specifically, a low-privileged user can upload a crafted file or metadata that contains malicious JavaScript code. When an administrator or higher-privileged user views or interacts with this file, the stored malicious script executes in their browser context. This can lead to privilege escalation by hijacking admin sessions, stealing authentication tokens, or performing unauthorized actions on behalf of the admin user. The CVSS 3.1 score of 5.4 reflects that the attack vector is network-based, requires low privileges, and user interaction (admin viewing the file) is necessary. The scope is changed, indicating that the vulnerability affects components beyond the initially compromised user context. The impact includes limited confidentiality and integrity loss but no availability impact. No known exploits in the wild have been reported yet, and no official patches are linked in the provided data, suggesting users should verify updates from the vendor. This vulnerability is categorized under CWE-79, which is a common web application security issue related to improper input validation and output encoding leading to XSS.

Potential Impact

For European organizations using Cloudreve for internal or external cloud storage services, this vulnerability poses a risk of privilege escalation and potential compromise of administrative accounts. Successful exploitation could allow attackers to execute arbitrary scripts in the context of admin users, leading to unauthorized access to sensitive files, modification of stored data, or further lateral movement within the organization’s infrastructure. This is particularly concerning for organizations handling sensitive or regulated data under GDPR, as unauthorized access or data manipulation could result in compliance violations and reputational damage. Since the vulnerability requires an admin to interact with the malicious file, organizations with multiple administrators or collaborative file sharing workflows are at higher risk. The attack could be leveraged in targeted phishing or social engineering campaigns within the organization to trick admins into triggering the exploit. Although no active exploits are reported, the presence of this vulnerability in a cloud storage platform used in Europe could attract attackers aiming to compromise cloud services and gain footholds in enterprise environments.

Mitigation Recommendations

European organizations should immediately audit their Cloudreve deployments to identify affected versions (v1.0.0 through v3.5.3). Until an official patch is available, implement strict input validation and output encoding on file metadata and names to neutralize potential scripts. Restrict file sharing permissions to trusted users and limit admin interactions with files uploaded by low-privileged users. Employ Content Security Policy (CSP) headers to reduce the impact of XSS by restricting script execution sources. Monitor admin activities and logs for unusual behavior or access patterns. Educate administrators about the risk of interacting with untrusted files and encourage caution when reviewing shared content. Consider isolating the Cloudreve admin interface within a secure network segment or VPN to reduce exposure. Regularly check for vendor updates or security advisories and apply patches promptly once released. Additionally, implement multi-factor authentication for admin accounts to mitigate session hijacking risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Mend
Date Reserved
2022-05-31T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68386826182aa0cae2801b4f

Added to database: 5/29/2025, 1:59:02 PM

Last enriched: 7/8/2025, 2:42:59 AM

Last updated: 8/18/2025, 11:31:56 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats