Skip to main content

CVE-2022-39835: n/a in n/a

Medium
VulnerabilityCVE-2022-39835cvecve-2022-39835
Published: Tue Sep 27 2022 (09/27/2022, 18:21:13 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

An issue was discovered in Gajim through 1.4.7. The vulnerability allows attackers, via crafted XML stanzas, to correct messages that were not sent by them. The attacker needs to be part of the group chat or single chat. The fixed version is 1.5.0.

AI-Powered Analysis

AILast updated: 07/07/2025, 14:25:26 UTC

Technical Analysis

CVE-2022-39835 is a medium-severity vulnerability affecting Gajim, an open-source XMPP client used for instant messaging. The vulnerability exists in versions up to 1.4.7 and allows an attacker who is a participant in a group or single chat to manipulate message correction functionality via crafted XML stanzas. Specifically, the attacker can correct messages that were not originally sent by them, effectively altering the chat history or message content attributed to other users. This flaw arises from improper authorization checks (CWE-284) in the handling of message correction stanzas, enabling unauthorized message edits. The vulnerability does not require any privileges beyond being a member of the chat, nor does it require user interaction beyond sending crafted XML data. The fixed version addressing this issue is Gajim 1.5.0. The CVSS v3.1 base score is 5.3, reflecting a network attack vector with low complexity, no privileges required, no user interaction, and limited impact confined to message integrity without affecting confidentiality or availability. No known exploits have been reported in the wild to date.

Potential Impact

For European organizations using Gajim as a communication tool, this vulnerability could undermine the integrity of chat communications. Attackers who are part of the same chat group can alter messages sent by others, potentially causing misinformation, confusion, or reputational damage. This could be particularly impactful in sensitive environments such as corporate communications, legal discussions, or governmental messaging where message authenticity is critical. Although confidentiality and availability are not directly affected, the ability to tamper with message content can erode trust in communication channels and complicate audit trails or compliance efforts. Given that Gajim is often used by privacy-conscious users and organizations valuing open-source solutions, the vulnerability could affect sectors relying on secure messaging, including NGOs, research institutions, and small to medium enterprises across Europe.

Mitigation Recommendations

Organizations should upgrade Gajim clients to version 1.5.0 or later, where this vulnerability is fixed. Until upgrades can be performed, users should limit chat membership to trusted participants only, minimizing the risk of malicious insiders exploiting this flaw. Network-level controls such as monitoring and filtering unusual XML stanza patterns could help detect exploitation attempts. Additionally, organizations should educate users about verifying message authenticity through out-of-band channels when critical information is exchanged. Implementing logging and audit mechanisms on chat servers to detect anomalous message corrections may also assist in early detection of exploitation. Finally, consider using alternative secure messaging platforms with robust message integrity protections if upgrading is not feasible in the short term.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-09-05T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682df35bc4522896dcc06564

Added to database: 5/21/2025, 3:38:03 PM

Last enriched: 7/7/2025, 2:25:26 PM

Last updated: 8/15/2025, 4:38:48 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats