Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-3348: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in tooljet tooljet/tooljet

0
Medium
VulnerabilityCVE-2022-3348cvecve-2022-3348cwe-200
Published: Wed Sep 28 2022 (09/28/2022, 08:40:09 UTC)
Source: CVE
Vendor/Project: tooljet
Product: tooljet/tooljet

Description

Just like in the previous report, an attacker could steal the account of different users. But in this case, it's a little bit more specific, because it is needed to be an editor in the same app as the victim.

AI-Powered Analysis

AILast updated: 07/07/2025, 15:42:47 UTC

Technical Analysis

CVE-2022-3348 is a medium-severity vulnerability classified under CWE-200, indicating an exposure of sensitive information to unauthorized actors within the tooljet/tooljet platform. Tooljet is an open-source low-code platform used to build internal tools and applications. This vulnerability allows an attacker who already has editor-level privileges within the same application as the victim to steal account information of other users. The attack vector requires network access (AV:N) and low attack complexity (AC:L), but crucially requires the attacker to have high privileges (PR:H) as an editor and does not require user interaction (UI:N). The impact affects confidentiality and integrity (C:H/I:H) but not availability (A:N). The vulnerability arises because sensitive user data is exposed improperly to users with editor roles, allowing them to access information beyond their intended scope. Although the affected versions are unspecified, the vulnerability was published on September 28, 2022, and no public exploits have been reported in the wild. The lack of a patch link suggests that remediation may require vendor intervention or configuration changes. Given the nature of the platform, this vulnerability could lead to unauthorized access to user accounts and potentially sensitive internal data managed through Tooljet applications.

Potential Impact

For European organizations, especially those using Tooljet to develop internal business applications, this vulnerability poses a significant risk to data confidentiality and integrity. Since the attacker must already have editor privileges, the threat primarily concerns insider threats or compromised editor accounts. Exploitation could lead to unauthorized access to sensitive user accounts, potentially exposing personal data, business-critical information, or enabling further privilege escalation within the organization. This could result in data breaches subject to GDPR regulations, leading to legal and financial repercussions. Additionally, the exposure of sensitive information could undermine trust in internal systems and disrupt business operations. Organizations relying on Tooljet for internal workflows or customer data management are particularly vulnerable, as the platform’s role in aggregating data could amplify the impact of such an exposure.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify the version of Tooljet in use and monitor vendor communications for official patches or updates addressing CVE-2022-3348. Until a patch is available, organizations should enforce strict role-based access controls, limiting editor privileges to trusted personnel only and regularly auditing editor activities. Implementing network segmentation to restrict access to the Tooljet platform and employing strong authentication mechanisms (e.g., multi-factor authentication) for editor accounts can reduce the risk of account compromise. Additionally, organizations should review and minimize the amount of sensitive information accessible to editors within the application, applying the principle of least privilege. Monitoring and logging access to sensitive data within Tooljet can help detect suspicious activities early. Finally, conducting internal security awareness training focused on insider threats and secure usage of low-code platforms will further reduce exploitation risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
@huntrdev
Date Reserved
2022-09-28T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.0
State
PUBLISHED

Threat ID: 682de1cdc4522896dcbffb07

Added to database: 5/21/2025, 2:23:09 PM

Last enriched: 7/7/2025, 3:42:47 PM

Last updated: 2/7/2026, 4:49:38 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats