Skip to main content

CVE-2022-3348: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in tooljet tooljet/tooljet

Medium
VulnerabilityCVE-2022-3348cvecve-2022-3348cwe-200
Published: Wed Sep 28 2022 (09/28/2022, 08:40:09 UTC)
Source: CVE
Vendor/Project: tooljet
Product: tooljet/tooljet

Description

Just like in the previous report, an attacker could steal the account of different users. But in this case, it's a little bit more specific, because it is needed to be an editor in the same app as the victim.

AI-Powered Analysis

AILast updated: 07/07/2025, 15:42:47 UTC

Technical Analysis

CVE-2022-3348 is a medium-severity vulnerability classified under CWE-200, indicating an exposure of sensitive information to unauthorized actors within the tooljet/tooljet platform. Tooljet is an open-source low-code platform used to build internal tools and applications. This vulnerability allows an attacker who already has editor-level privileges within the same application as the victim to steal account information of other users. The attack vector requires network access (AV:N) and low attack complexity (AC:L), but crucially requires the attacker to have high privileges (PR:H) as an editor and does not require user interaction (UI:N). The impact affects confidentiality and integrity (C:H/I:H) but not availability (A:N). The vulnerability arises because sensitive user data is exposed improperly to users with editor roles, allowing them to access information beyond their intended scope. Although the affected versions are unspecified, the vulnerability was published on September 28, 2022, and no public exploits have been reported in the wild. The lack of a patch link suggests that remediation may require vendor intervention or configuration changes. Given the nature of the platform, this vulnerability could lead to unauthorized access to user accounts and potentially sensitive internal data managed through Tooljet applications.

Potential Impact

For European organizations, especially those using Tooljet to develop internal business applications, this vulnerability poses a significant risk to data confidentiality and integrity. Since the attacker must already have editor privileges, the threat primarily concerns insider threats or compromised editor accounts. Exploitation could lead to unauthorized access to sensitive user accounts, potentially exposing personal data, business-critical information, or enabling further privilege escalation within the organization. This could result in data breaches subject to GDPR regulations, leading to legal and financial repercussions. Additionally, the exposure of sensitive information could undermine trust in internal systems and disrupt business operations. Organizations relying on Tooljet for internal workflows or customer data management are particularly vulnerable, as the platform’s role in aggregating data could amplify the impact of such an exposure.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify the version of Tooljet in use and monitor vendor communications for official patches or updates addressing CVE-2022-3348. Until a patch is available, organizations should enforce strict role-based access controls, limiting editor privileges to trusted personnel only and regularly auditing editor activities. Implementing network segmentation to restrict access to the Tooljet platform and employing strong authentication mechanisms (e.g., multi-factor authentication) for editor accounts can reduce the risk of account compromise. Additionally, organizations should review and minimize the amount of sensitive information accessible to editors within the application, applying the principle of least privilege. Monitoring and logging access to sensitive data within Tooljet can help detect suspicious activities early. Finally, conducting internal security awareness training focused on insider threats and secure usage of low-code platforms will further reduce exploitation risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntrdev
Date Reserved
2022-09-28T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.0
State
PUBLISHED

Threat ID: 682de1cdc4522896dcbffb07

Added to database: 5/21/2025, 2:23:09 PM

Last enriched: 7/7/2025, 3:42:47 PM

Last updated: 8/12/2025, 11:08:43 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats