CVE-2022-3348: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in tooljet tooljet/tooljet
Just like in the previous report, an attacker could steal the account of different users. But in this case, it's a little bit more specific, because it is needed to be an editor in the same app as the victim.
AI Analysis
Technical Summary
CVE-2022-3348 is a medium-severity vulnerability classified under CWE-200, indicating an exposure of sensitive information to unauthorized actors within the tooljet/tooljet platform. Tooljet is an open-source low-code platform used to build internal tools and applications. This vulnerability allows an attacker who already has editor-level privileges within the same application as the victim to steal account information of other users. The attack vector requires network access (AV:N) and low attack complexity (AC:L), but crucially requires the attacker to have high privileges (PR:H) as an editor and does not require user interaction (UI:N). The impact affects confidentiality and integrity (C:H/I:H) but not availability (A:N). The vulnerability arises because sensitive user data is exposed improperly to users with editor roles, allowing them to access information beyond their intended scope. Although the affected versions are unspecified, the vulnerability was published on September 28, 2022, and no public exploits have been reported in the wild. The lack of a patch link suggests that remediation may require vendor intervention or configuration changes. Given the nature of the platform, this vulnerability could lead to unauthorized access to user accounts and potentially sensitive internal data managed through Tooljet applications.
Potential Impact
For European organizations, especially those using Tooljet to develop internal business applications, this vulnerability poses a significant risk to data confidentiality and integrity. Since the attacker must already have editor privileges, the threat primarily concerns insider threats or compromised editor accounts. Exploitation could lead to unauthorized access to sensitive user accounts, potentially exposing personal data, business-critical information, or enabling further privilege escalation within the organization. This could result in data breaches subject to GDPR regulations, leading to legal and financial repercussions. Additionally, the exposure of sensitive information could undermine trust in internal systems and disrupt business operations. Organizations relying on Tooljet for internal workflows or customer data management are particularly vulnerable, as the platform’s role in aggregating data could amplify the impact of such an exposure.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify the version of Tooljet in use and monitor vendor communications for official patches or updates addressing CVE-2022-3348. Until a patch is available, organizations should enforce strict role-based access controls, limiting editor privileges to trusted personnel only and regularly auditing editor activities. Implementing network segmentation to restrict access to the Tooljet platform and employing strong authentication mechanisms (e.g., multi-factor authentication) for editor accounts can reduce the risk of account compromise. Additionally, organizations should review and minimize the amount of sensitive information accessible to editors within the application, applying the principle of least privilege. Monitoring and logging access to sensitive data within Tooljet can help detect suspicious activities early. Finally, conducting internal security awareness training focused on insider threats and secure usage of low-code platforms will further reduce exploitation risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium
CVE-2022-3348: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in tooljet tooljet/tooljet
Description
Just like in the previous report, an attacker could steal the account of different users. But in this case, it's a little bit more specific, because it is needed to be an editor in the same app as the victim.
AI-Powered Analysis
Technical Analysis
CVE-2022-3348 is a medium-severity vulnerability classified under CWE-200, indicating an exposure of sensitive information to unauthorized actors within the tooljet/tooljet platform. Tooljet is an open-source low-code platform used to build internal tools and applications. This vulnerability allows an attacker who already has editor-level privileges within the same application as the victim to steal account information of other users. The attack vector requires network access (AV:N) and low attack complexity (AC:L), but crucially requires the attacker to have high privileges (PR:H) as an editor and does not require user interaction (UI:N). The impact affects confidentiality and integrity (C:H/I:H) but not availability (A:N). The vulnerability arises because sensitive user data is exposed improperly to users with editor roles, allowing them to access information beyond their intended scope. Although the affected versions are unspecified, the vulnerability was published on September 28, 2022, and no public exploits have been reported in the wild. The lack of a patch link suggests that remediation may require vendor intervention or configuration changes. Given the nature of the platform, this vulnerability could lead to unauthorized access to user accounts and potentially sensitive internal data managed through Tooljet applications.
Potential Impact
For European organizations, especially those using Tooljet to develop internal business applications, this vulnerability poses a significant risk to data confidentiality and integrity. Since the attacker must already have editor privileges, the threat primarily concerns insider threats or compromised editor accounts. Exploitation could lead to unauthorized access to sensitive user accounts, potentially exposing personal data, business-critical information, or enabling further privilege escalation within the organization. This could result in data breaches subject to GDPR regulations, leading to legal and financial repercussions. Additionally, the exposure of sensitive information could undermine trust in internal systems and disrupt business operations. Organizations relying on Tooljet for internal workflows or customer data management are particularly vulnerable, as the platform’s role in aggregating data could amplify the impact of such an exposure.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify the version of Tooljet in use and monitor vendor communications for official patches or updates addressing CVE-2022-3348. Until a patch is available, organizations should enforce strict role-based access controls, limiting editor privileges to trusted personnel only and regularly auditing editor activities. Implementing network segmentation to restrict access to the Tooljet platform and employing strong authentication mechanisms (e.g., multi-factor authentication) for editor accounts can reduce the risk of account compromise. Additionally, organizations should review and minimize the amount of sensitive information accessible to editors within the application, applying the principle of least privilege. Monitoring and logging access to sensitive data within Tooljet can help detect suspicious activities early. Finally, conducting internal security awareness training focused on insider threats and secure usage of low-code platforms will further reduce exploitation risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntrdev
- Date Reserved
- 2022-09-28T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 682de1cdc4522896dcbffb07
Added to database: 5/21/2025, 2:23:09 PM
Last enriched: 7/7/2025, 3:42:47 PM
Last updated: 8/12/2025, 11:08:43 AM
Views: 11
Related Threats
CVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumCVE-2025-8464: CWE-23 Relative Path Traversal in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
MediumCVE-2025-7499: CWE-862 Missing Authorization in wpdevteam BetterDocs – Advanced AI-Driven Documentation, FAQ & Knowledge Base Tool for Elementor & Gutenberg with Encyclopedia, AI Support, Instant Answers
MediumCVE-2025-8898: CWE-862 Missing Authorization in magepeopleteam E-cab Taxi Booking Manager for Woocommerce
CriticalCVE-2025-8896: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cozmoslabs User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.