CVE-2022-41945: CWE-94: Improper Control of Generation of Code ('Code Injection') in 4ra1n super-xray
super-xray is a vulnerability scanner (xray) GUI launcher. In version 0.1-beta, the URL is not filtered and directly spliced into the command, resulting in a possible RCE vulnerability. Users should upgrade to super-xray 0.2-beta.
AI Analysis
Technical Summary
CVE-2022-41945 is a code injection vulnerability classified under CWE-94, affecting the 4ra1n super-xray product, specifically versions prior to 0.2-beta. Super-xray is a GUI launcher for the xray vulnerability scanner. The vulnerability arises because the application does not properly filter or sanitize URLs before incorporating them directly into command execution. This improper control of code generation allows an attacker to inject arbitrary code via crafted URLs, potentially leading to remote code execution (RCE) on the host system. Since the URL input is directly spliced into commands without validation, an attacker can manipulate the input to execute malicious commands with the privileges of the user running the super-xray application. The vulnerability was published on November 21, 2022, and although no known exploits have been reported in the wild, the risk remains significant due to the nature of RCE vulnerabilities. The vendor has addressed this issue in version 0.2-beta of super-xray, recommending users upgrade to mitigate the risk. The vulnerability does not require authentication or user interaction beyond supplying a malicious URL, increasing the ease of exploitation. The scope is limited to users running vulnerable versions of super-xray, which is a specialized tool used primarily by security professionals and organizations conducting vulnerability assessments.
Potential Impact
For European organizations, the impact of this vulnerability could be substantial in environments where super-xray is used for security scanning and vulnerability management. Successful exploitation could allow attackers to execute arbitrary code on scanning hosts, potentially leading to compromise of sensitive internal systems, theft of confidential information, or pivoting within the network. This risk is particularly relevant for organizations in sectors with high security requirements such as finance, critical infrastructure, and government agencies. Since super-xray is a tool used by security teams, exploitation could undermine trust in security processes and tools, leading to broader operational risks. Additionally, compromised scanning hosts could be leveraged to launch further attacks or disrupt security monitoring activities. Although the tool’s niche usage limits widespread impact, organizations relying on it must consider the potential for targeted attacks exploiting this vulnerability.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade super-xray to version 0.2-beta or later, where the URL input filtering issue has been resolved. In addition to upgrading, organizations should implement strict input validation and sanitization controls on any user-supplied data that could be incorporated into command execution contexts. Running super-xray with the least privilege necessary can limit the impact of potential exploitation. Network segmentation and restricting access to scanning hosts can reduce exposure. Monitoring and logging command execution and unusual process activity on scanning hosts can help detect exploitation attempts. Organizations should also review their internal usage policies for security tools to ensure that only trusted personnel have access and that tools are regularly updated. Finally, consider alternative vulnerability scanning tools with robust security controls if upgrading is not immediately feasible.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain, Poland
CVE-2022-41945: CWE-94: Improper Control of Generation of Code ('Code Injection') in 4ra1n super-xray
Description
super-xray is a vulnerability scanner (xray) GUI launcher. In version 0.1-beta, the URL is not filtered and directly spliced into the command, resulting in a possible RCE vulnerability. Users should upgrade to super-xray 0.2-beta.
AI-Powered Analysis
Technical Analysis
CVE-2022-41945 is a code injection vulnerability classified under CWE-94, affecting the 4ra1n super-xray product, specifically versions prior to 0.2-beta. Super-xray is a GUI launcher for the xray vulnerability scanner. The vulnerability arises because the application does not properly filter or sanitize URLs before incorporating them directly into command execution. This improper control of code generation allows an attacker to inject arbitrary code via crafted URLs, potentially leading to remote code execution (RCE) on the host system. Since the URL input is directly spliced into commands without validation, an attacker can manipulate the input to execute malicious commands with the privileges of the user running the super-xray application. The vulnerability was published on November 21, 2022, and although no known exploits have been reported in the wild, the risk remains significant due to the nature of RCE vulnerabilities. The vendor has addressed this issue in version 0.2-beta of super-xray, recommending users upgrade to mitigate the risk. The vulnerability does not require authentication or user interaction beyond supplying a malicious URL, increasing the ease of exploitation. The scope is limited to users running vulnerable versions of super-xray, which is a specialized tool used primarily by security professionals and organizations conducting vulnerability assessments.
Potential Impact
For European organizations, the impact of this vulnerability could be substantial in environments where super-xray is used for security scanning and vulnerability management. Successful exploitation could allow attackers to execute arbitrary code on scanning hosts, potentially leading to compromise of sensitive internal systems, theft of confidential information, or pivoting within the network. This risk is particularly relevant for organizations in sectors with high security requirements such as finance, critical infrastructure, and government agencies. Since super-xray is a tool used by security teams, exploitation could undermine trust in security processes and tools, leading to broader operational risks. Additionally, compromised scanning hosts could be leveraged to launch further attacks or disrupt security monitoring activities. Although the tool’s niche usage limits widespread impact, organizations relying on it must consider the potential for targeted attacks exploiting this vulnerability.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade super-xray to version 0.2-beta or later, where the URL input filtering issue has been resolved. In addition to upgrading, organizations should implement strict input validation and sanitization controls on any user-supplied data that could be incorporated into command execution contexts. Running super-xray with the least privilege necessary can limit the impact of potential exploitation. Network segmentation and restricting access to scanning hosts can reduce exposure. Monitoring and logging command execution and unusual process activity on scanning hosts can help detect exploitation attempts. Organizations should also review their internal usage policies for security tools to ensure that only trusted personnel have access and that tools are regularly updated. Finally, consider alternative vulnerability scanning tools with robust security controls if upgrading is not immediately feasible.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-30T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6db5
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 8:38:42 PM
Last updated: 2/7/2026, 9:16:52 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.