Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-39835: n/a in n/a

0
Medium
VulnerabilityCVE-2022-39835cvecve-2022-39835
Published: Tue Sep 27 2022 (09/27/2022, 18:21:13 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

An issue was discovered in Gajim through 1.4.7. The vulnerability allows attackers, via crafted XML stanzas, to correct messages that were not sent by them. The attacker needs to be part of the group chat or single chat. The fixed version is 1.5.0.

AI-Powered Analysis

AILast updated: 07/07/2025, 14:25:26 UTC

Technical Analysis

CVE-2022-39835 is a medium-severity vulnerability affecting Gajim, an open-source XMPP client used for instant messaging. The vulnerability exists in versions up to 1.4.7 and allows an attacker who is a participant in a group or single chat to manipulate message correction functionality via crafted XML stanzas. Specifically, the attacker can correct messages that were not originally sent by them, effectively altering the chat history or message content attributed to other users. This flaw arises from improper authorization checks (CWE-284) in the handling of message correction stanzas, enabling unauthorized message edits. The vulnerability does not require any privileges beyond being a member of the chat, nor does it require user interaction beyond sending crafted XML data. The fixed version addressing this issue is Gajim 1.5.0. The CVSS v3.1 base score is 5.3, reflecting a network attack vector with low complexity, no privileges required, no user interaction, and limited impact confined to message integrity without affecting confidentiality or availability. No known exploits have been reported in the wild to date.

Potential Impact

For European organizations using Gajim as a communication tool, this vulnerability could undermine the integrity of chat communications. Attackers who are part of the same chat group can alter messages sent by others, potentially causing misinformation, confusion, or reputational damage. This could be particularly impactful in sensitive environments such as corporate communications, legal discussions, or governmental messaging where message authenticity is critical. Although confidentiality and availability are not directly affected, the ability to tamper with message content can erode trust in communication channels and complicate audit trails or compliance efforts. Given that Gajim is often used by privacy-conscious users and organizations valuing open-source solutions, the vulnerability could affect sectors relying on secure messaging, including NGOs, research institutions, and small to medium enterprises across Europe.

Mitigation Recommendations

Organizations should upgrade Gajim clients to version 1.5.0 or later, where this vulnerability is fixed. Until upgrades can be performed, users should limit chat membership to trusted participants only, minimizing the risk of malicious insiders exploiting this flaw. Network-level controls such as monitoring and filtering unusual XML stanza patterns could help detect exploitation attempts. Additionally, organizations should educate users about verifying message authenticity through out-of-band channels when critical information is exchanged. Implementing logging and audit mechanisms on chat servers to detect anomalous message corrections may also assist in early detection of exploitation. Finally, consider using alternative secure messaging platforms with robust message integrity protections if upgrading is not feasible in the short term.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-09-05T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682df35bc4522896dcc06564

Added to database: 5/21/2025, 3:38:03 PM

Last enriched: 7/7/2025, 2:25:26 PM

Last updated: 2/7/2026, 4:16:39 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats