CVE-2022-39835: n/a in n/a
An issue was discovered in Gajim through 1.4.7. The vulnerability allows attackers, via crafted XML stanzas, to correct messages that were not sent by them. The attacker needs to be part of the group chat or single chat. The fixed version is 1.5.0.
AI Analysis
Technical Summary
CVE-2022-39835 is a medium-severity vulnerability affecting Gajim, an open-source XMPP client used for instant messaging. The vulnerability exists in versions up to 1.4.7 and allows an attacker who is a participant in a group or single chat to manipulate message correction functionality via crafted XML stanzas. Specifically, the attacker can correct messages that were not originally sent by them, effectively altering the chat history or message content attributed to other users. This flaw arises from improper authorization checks (CWE-284) in the handling of message correction stanzas, enabling unauthorized message edits. The vulnerability does not require any privileges beyond being a member of the chat, nor does it require user interaction beyond sending crafted XML data. The fixed version addressing this issue is Gajim 1.5.0. The CVSS v3.1 base score is 5.3, reflecting a network attack vector with low complexity, no privileges required, no user interaction, and limited impact confined to message integrity without affecting confidentiality or availability. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations using Gajim as a communication tool, this vulnerability could undermine the integrity of chat communications. Attackers who are part of the same chat group can alter messages sent by others, potentially causing misinformation, confusion, or reputational damage. This could be particularly impactful in sensitive environments such as corporate communications, legal discussions, or governmental messaging where message authenticity is critical. Although confidentiality and availability are not directly affected, the ability to tamper with message content can erode trust in communication channels and complicate audit trails or compliance efforts. Given that Gajim is often used by privacy-conscious users and organizations valuing open-source solutions, the vulnerability could affect sectors relying on secure messaging, including NGOs, research institutions, and small to medium enterprises across Europe.
Mitigation Recommendations
Organizations should upgrade Gajim clients to version 1.5.0 or later, where this vulnerability is fixed. Until upgrades can be performed, users should limit chat membership to trusted participants only, minimizing the risk of malicious insiders exploiting this flaw. Network-level controls such as monitoring and filtering unusual XML stanza patterns could help detect exploitation attempts. Additionally, organizations should educate users about verifying message authenticity through out-of-band channels when critical information is exchanged. Implementing logging and audit mechanisms on chat servers to detect anomalous message corrections may also assist in early detection of exploitation. Finally, consider using alternative secure messaging platforms with robust message integrity protections if upgrading is not feasible in the short term.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2022-39835: n/a in n/a
Description
An issue was discovered in Gajim through 1.4.7. The vulnerability allows attackers, via crafted XML stanzas, to correct messages that were not sent by them. The attacker needs to be part of the group chat or single chat. The fixed version is 1.5.0.
AI-Powered Analysis
Technical Analysis
CVE-2022-39835 is a medium-severity vulnerability affecting Gajim, an open-source XMPP client used for instant messaging. The vulnerability exists in versions up to 1.4.7 and allows an attacker who is a participant in a group or single chat to manipulate message correction functionality via crafted XML stanzas. Specifically, the attacker can correct messages that were not originally sent by them, effectively altering the chat history or message content attributed to other users. This flaw arises from improper authorization checks (CWE-284) in the handling of message correction stanzas, enabling unauthorized message edits. The vulnerability does not require any privileges beyond being a member of the chat, nor does it require user interaction beyond sending crafted XML data. The fixed version addressing this issue is Gajim 1.5.0. The CVSS v3.1 base score is 5.3, reflecting a network attack vector with low complexity, no privileges required, no user interaction, and limited impact confined to message integrity without affecting confidentiality or availability. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations using Gajim as a communication tool, this vulnerability could undermine the integrity of chat communications. Attackers who are part of the same chat group can alter messages sent by others, potentially causing misinformation, confusion, or reputational damage. This could be particularly impactful in sensitive environments such as corporate communications, legal discussions, or governmental messaging where message authenticity is critical. Although confidentiality and availability are not directly affected, the ability to tamper with message content can erode trust in communication channels and complicate audit trails or compliance efforts. Given that Gajim is often used by privacy-conscious users and organizations valuing open-source solutions, the vulnerability could affect sectors relying on secure messaging, including NGOs, research institutions, and small to medium enterprises across Europe.
Mitigation Recommendations
Organizations should upgrade Gajim clients to version 1.5.0 or later, where this vulnerability is fixed. Until upgrades can be performed, users should limit chat membership to trusted participants only, minimizing the risk of malicious insiders exploiting this flaw. Network-level controls such as monitoring and filtering unusual XML stanza patterns could help detect exploitation attempts. Additionally, organizations should educate users about verifying message authenticity through out-of-band channels when critical information is exchanged. Implementing logging and audit mechanisms on chat servers to detect anomalous message corrections may also assist in early detection of exploitation. Finally, consider using alternative secure messaging platforms with robust message integrity protections if upgrading is not feasible in the short term.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-09-05T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682df35bc4522896dcc06564
Added to database: 5/21/2025, 3:38:03 PM
Last enriched: 7/7/2025, 2:25:26 PM
Last updated: 8/15/2025, 4:38:48 AM
Views: 13
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.