CVE-2022-35196: n/a in n/a
TestLink v1.9.20 was discovered to contain a Cross-Site Request Forgery (CSRF) via /lib/plan/planView.php.
AI Analysis
Technical Summary
CVE-2022-35196 is a high-severity vulnerability identified in TestLink version 1.9.20, involving a Cross-Site Request Forgery (CSRF) weakness via the /lib/plan/planView.php endpoint. TestLink is an open-source test management tool widely used for managing software testing processes. The vulnerability allows an attacker to trick an authenticated user into submitting a forged request to the vulnerable endpoint without their consent. This can lead to unauthorized actions being performed with the privileges of the victim user. The CVSS 3.1 base score of 8.8 reflects the critical nature of this flaw, indicating that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), does not require privileges (PR:N), but does require user interaction (UI:R). The impact is severe across confidentiality, integrity, and availability (C:H/I:H/A:H), meaning an attacker can potentially access sensitive data, modify or delete data, and disrupt service availability. The vulnerability is categorized under CWE-352, which corresponds to CSRF attacks. Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the nature of the affected application and the high CVSS score. The lack of vendor or product-specific details in the provided data suggests that this vulnerability is specific to TestLink 1.9.20 and possibly earlier versions, but no patch links are provided, indicating that mitigation might require manual intervention or updates from the community or vendor.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on TestLink for managing their software testing lifecycle. Successful exploitation could allow attackers to perform unauthorized actions such as altering test plans, deleting critical test data, or injecting malicious configurations, potentially leading to compromised software quality assurance processes. This could cascade into broader operational disruptions, data integrity issues, and loss of trust in software releases. Confidential information related to testing strategies and proprietary software details could be exposed, leading to intellectual property theft or competitive disadvantage. Additionally, availability impacts could delay critical software deployments or updates, affecting business continuity. Organizations in sectors with stringent regulatory requirements (e.g., finance, healthcare, and critical infrastructure) may face compliance risks if such vulnerabilities are exploited, potentially resulting in legal and reputational consequences.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately assess their use of TestLink version 1.9.20 and identify affected instances. 2) Apply any available patches or updates from the TestLink community or maintainers; if no official patch exists, consider upgrading to a newer, unaffected version. 3) Implement CSRF protection mechanisms such as synchronizer tokens or double-submit cookies in the application if customization is possible. 4) Restrict access to the TestLink application via network segmentation and enforce strict authentication and authorization controls to limit exposure. 5) Employ Web Application Firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting the vulnerable endpoint. 6) Educate users about the risks of CSRF and encourage cautious behavior regarding unsolicited links or requests while authenticated. 7) Monitor logs and network traffic for suspicious activities related to /lib/plan/planView.php to detect potential exploitation attempts early. 8) Consider implementing multi-factor authentication (MFA) to reduce the risk of session hijacking that could facilitate CSRF attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-35196: n/a in n/a
Description
TestLink v1.9.20 was discovered to contain a Cross-Site Request Forgery (CSRF) via /lib/plan/planView.php.
AI-Powered Analysis
Technical Analysis
CVE-2022-35196 is a high-severity vulnerability identified in TestLink version 1.9.20, involving a Cross-Site Request Forgery (CSRF) weakness via the /lib/plan/planView.php endpoint. TestLink is an open-source test management tool widely used for managing software testing processes. The vulnerability allows an attacker to trick an authenticated user into submitting a forged request to the vulnerable endpoint without their consent. This can lead to unauthorized actions being performed with the privileges of the victim user. The CVSS 3.1 base score of 8.8 reflects the critical nature of this flaw, indicating that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), does not require privileges (PR:N), but does require user interaction (UI:R). The impact is severe across confidentiality, integrity, and availability (C:H/I:H/A:H), meaning an attacker can potentially access sensitive data, modify or delete data, and disrupt service availability. The vulnerability is categorized under CWE-352, which corresponds to CSRF attacks. Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the nature of the affected application and the high CVSS score. The lack of vendor or product-specific details in the provided data suggests that this vulnerability is specific to TestLink 1.9.20 and possibly earlier versions, but no patch links are provided, indicating that mitigation might require manual intervention or updates from the community or vendor.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on TestLink for managing their software testing lifecycle. Successful exploitation could allow attackers to perform unauthorized actions such as altering test plans, deleting critical test data, or injecting malicious configurations, potentially leading to compromised software quality assurance processes. This could cascade into broader operational disruptions, data integrity issues, and loss of trust in software releases. Confidential information related to testing strategies and proprietary software details could be exposed, leading to intellectual property theft or competitive disadvantage. Additionally, availability impacts could delay critical software deployments or updates, affecting business continuity. Organizations in sectors with stringent regulatory requirements (e.g., finance, healthcare, and critical infrastructure) may face compliance risks if such vulnerabilities are exploited, potentially resulting in legal and reputational consequences.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately assess their use of TestLink version 1.9.20 and identify affected instances. 2) Apply any available patches or updates from the TestLink community or maintainers; if no official patch exists, consider upgrading to a newer, unaffected version. 3) Implement CSRF protection mechanisms such as synchronizer tokens or double-submit cookies in the application if customization is possible. 4) Restrict access to the TestLink application via network segmentation and enforce strict authentication and authorization controls to limit exposure. 5) Employ Web Application Firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting the vulnerable endpoint. 6) Educate users about the risks of CSRF and encourage cautious behavior regarding unsolicited links or requests while authenticated. 7) Monitor logs and network traffic for suspicious activities related to /lib/plan/planView.php to detect potential exploitation attempts early. 8) Consider implementing multi-factor authentication (MFA) to reduce the risk of session hijacking that could facilitate CSRF attacks.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-07-04T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68386826182aa0cae2801b5f
Added to database: 5/29/2025, 1:59:02 PM
Last enriched: 7/8/2025, 3:10:09 AM
Last updated: 2/3/2026, 1:33:42 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7760: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ofisimo Web-Based Software Technologies Association Web Package Flora
HighCVE-2025-6397: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ankara Hosting Website Design Website Software
HighCVE-2026-1664: CWE-639 Authorization Bypass Through User-Controlled Key
MediumCVE-2025-11598: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Centralny Ośrodek Informatyki mObywatel
LowCVE-2026-1432: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in T-Systems Buroweb
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.