Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-41445: n/a in n/a

0
Medium
VulnerabilityCVE-2022-41445cvecve-2022-41445
Published: Tue Nov 22 2022 (11/22/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

A cross-site scripting (XSS) vulnerability in Record Management System using CodeIgniter 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Add Subject page.

AI-Powered Analysis

AILast updated: 06/25/2025, 00:21:07 UTC

Technical Analysis

CVE-2022-41445 is a cross-site scripting (XSS) vulnerability identified in a Record Management System that utilizes the CodeIgniter 1.0 framework. The vulnerability arises from insufficient input sanitization on the 'Add Subject' page, allowing an attacker to inject crafted payloads containing arbitrary web scripts or HTML. When a victim user accesses the affected page with the malicious payload, the injected script executes in their browser context. This can lead to session hijacking, defacement, or redirection to malicious sites. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation. According to the CVSS 3.1 vector (AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N), the attack requires network access, low attack complexity, and high privileges with user interaction. The scope is changed, indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality and integrity is low, with no impact on availability. No patches or vendor information are currently available, and there are no known exploits in the wild. The use of CodeIgniter 1.0, an outdated framework version, suggests that affected systems may be legacy or custom-built applications that have not been updated or maintained recently.

Potential Impact

For European organizations, the primary risk lies in the potential compromise of user sessions and unauthorized actions performed on behalf of authenticated users within the Record Management System. This could lead to unauthorized data disclosure or modification, especially if the system manages sensitive records such as personal data, legal documents, or financial information. Given the requirement for high privileges and user interaction, exploitation is more likely in environments where trusted users have elevated access and may be tricked into clicking malicious links or visiting crafted pages. The vulnerability could facilitate targeted phishing campaigns or lateral movement within an organization's internal network. While the direct availability impact is negligible, the integrity and confidentiality risks could undermine compliance with GDPR and other data protection regulations, potentially resulting in legal and reputational consequences. Organizations relying on legacy CodeIgniter 1.0 applications for record management are particularly vulnerable, especially in sectors like government, healthcare, and education where such systems may still be in use.

Mitigation Recommendations

1. Immediate mitigation should focus on input validation and output encoding on the 'Add Subject' page to neutralize any injected scripts. Implement context-aware escaping for all user-supplied data rendered in the HTML response. 2. Upgrade the underlying framework from CodeIgniter 1.0 to a supported, modern version that includes built-in protections against XSS vulnerabilities. 3. Conduct a thorough code review and security audit of all web application components to identify and remediate similar injection points. 4. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. 5. Educate privileged users about the risks of clicking untrusted links and encourage the use of multi-factor authentication to reduce the impact of session hijacking. 6. Monitor web application logs for suspicious input patterns and anomalous user behavior indicative of exploitation attempts. 7. If immediate patching is not feasible, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the vulnerable endpoint.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-09-26T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbeed43

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/25/2025, 12:21:07 AM

Last updated: 2/7/2026, 11:37:12 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats