Skip to main content

CVE-2022-41990: CWE-352 Cross-Site Request Forgery (CSRF) in Vinoj Cardoza 3D Tag Cloud

High
VulnerabilityCVE-2022-41990cvecve-2022-41990cwe-352
Published: Wed Jan 17 2024 (01/17/2024, 16:18:58 UTC)
Source: CVE
Vendor/Project: Vinoj Cardoza
Product: 3D Tag Cloud

Description

Cross-Site Request Forgery (CSRF) vulnerability in Vinoj Cardoza 3D Tag Cloud allows Stored XSS.This issue affects 3D Tag Cloud: from n/a through 3.8.

AI-Powered Analysis

AILast updated: 07/08/2025, 21:42:17 UTC

Technical Analysis

CVE-2022-41990 is a high-severity security vulnerability classified under CWE-352, which corresponds to Cross-Site Request Forgery (CSRF). This vulnerability affects the '3D Tag Cloud' product developed by Vinoj Cardoza, specifically versions up to 3.8. The vulnerability allows an attacker to exploit CSRF to perform unauthorized actions on behalf of an authenticated user without their consent. Additionally, it enables Stored Cross-Site Scripting (XSS), which means malicious scripts can be permanently stored on the target system and executed in the context of users who access the affected functionality. The CVSS 3.1 base score of 7.1 reflects the significant risk posed by this vulnerability, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the security scope of the vulnerable component. The impact metrics indicate low confidentiality (C:L), integrity (I:L), and availability (A:L) impacts, but combined with the scope change, this can lead to broader compromise. The vulnerability arises because the application does not properly validate the origin of requests, allowing attackers to craft malicious web pages that trick authenticated users into executing unwanted actions. The Stored XSS component can lead to session hijacking, defacement, or distribution of malware. No patches are currently linked, and no known exploits are reported in the wild, but the vulnerability is publicly disclosed and enriched by CISA, indicating recognition by security authorities.

Potential Impact

For European organizations using the 3D Tag Cloud product, this vulnerability poses a significant risk. The CSRF combined with Stored XSS can lead to unauthorized actions performed under the guise of legitimate users, potentially compromising user accounts, data integrity, and availability of services. Stored XSS can facilitate persistent attacks on users, including theft of session tokens, redirection to malicious sites, or installation of malware. Organizations relying on this product for web content visualization or interactive tag clouds may face reputational damage, data breaches, and operational disruptions. Given the network attack vector and no requirement for privileges, attackers can target any user accessing the vulnerable interface, increasing the threat surface. The requirement for user interaction means phishing or social engineering could be used to exploit this vulnerability. The impact is particularly critical for sectors with sensitive data or regulatory requirements such as finance, healthcare, and government institutions within Europe, where data protection laws like GDPR impose strict obligations on data security and breach notifications.

Mitigation Recommendations

Since no official patches are currently linked, European organizations should implement immediate compensating controls. These include: 1) Implementing strict CSRF protections such as anti-CSRF tokens in all state-changing requests within the 3D Tag Cloud application. 2) Enforcing Content Security Policy (CSP) headers to mitigate the impact of Stored XSS by restricting script execution sources. 3) Conducting thorough input validation and output encoding to prevent injection of malicious scripts. 4) Restricting user permissions and applying the principle of least privilege to minimize potential damage. 5) Monitoring web application logs for unusual activities indicative of CSRF or XSS exploitation attempts. 6) Educating users about phishing and social engineering risks to reduce successful exploitation via user interaction. 7) If feasible, temporarily disabling or isolating the vulnerable 3D Tag Cloud component until a patch or update is available. 8) Keeping abreast of vendor announcements for patches or updates and applying them promptly once released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2022-10-19T11:14:13.127Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6830a0ae0acd01a24927411e

Added to database: 5/23/2025, 4:22:06 PM

Last enriched: 7/8/2025, 9:42:17 PM

Last updated: 7/26/2025, 6:21:56 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats