Skip to main content

CVE-2022-42715: n/a in n/a

Medium
VulnerabilityCVE-2022-42715cvecve-2022-42715
Published: Wed Oct 12 2022 (10/12/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

A reflected XSS vulnerability exists in REDCap before 12.04.18 in the Alerts & Notifications upload feature. A crafted CSV file will, when uploaded, trigger arbitrary JavaScript code execution.

AI-Powered Analysis

AILast updated: 07/04/2025, 19:27:10 UTC

Technical Analysis

CVE-2022-42715 is a reflected Cross-Site Scripting (XSS) vulnerability identified in REDCap, a widely used web application for managing research data, particularly in clinical and academic environments. This vulnerability affects versions prior to 12.04.18 and is specifically triggered through the Alerts & Notifications upload feature. An attacker can craft a malicious CSV file containing embedded JavaScript code. When this file is uploaded via the vulnerable feature, the application fails to properly sanitize or encode the input, resulting in the execution of arbitrary JavaScript code in the context of the victim's browser session. This reflected XSS can lead to session hijacking, unauthorized actions on behalf of the user, or the theft of sensitive information. The vulnerability is rated with a CVSS 3.1 score of 6.1 (medium severity), reflecting that it requires no privileges (PR:N), has low attack complexity (AC:L), but does require user interaction (UI:R) to upload the malicious file. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the vulnerable component. Confidentiality and integrity impacts are low, and availability is not affected. No known exploits in the wild have been reported to date. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS.

Potential Impact

For European organizations using REDCap, particularly those in healthcare, research institutions, and universities, this vulnerability poses a significant risk to data confidentiality and integrity. Exploitation could allow attackers to execute malicious scripts in the context of authenticated users, potentially leading to unauthorized access to sensitive research data, manipulation of alerts and notifications, or phishing attacks targeting users. Given REDCap's role in managing sensitive clinical trial and patient data, such an attack could result in data breaches, regulatory non-compliance (e.g., GDPR violations), and reputational damage. The requirement for user interaction (uploading a malicious CSV) somewhat limits the attack vector but does not eliminate risk, especially in environments where multiple users have upload privileges. The reflected nature of the XSS means that the attack is transient and requires the victim to interact with a crafted link or file, but in a collaborative research environment, social engineering could facilitate this. The medium severity rating reflects these factors, but the potential impact on confidentiality and trust in research data is notable.

Mitigation Recommendations

European organizations should prioritize updating REDCap to version 12.04.18 or later, where this vulnerability is addressed. In the absence of an immediate patch, organizations should implement strict input validation and sanitization on the Alerts & Notifications upload feature, specifically filtering and encoding CSV file contents to prevent script injection. Restrict upload permissions to trusted users only and implement monitoring and alerting for unusual upload activities. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Conduct user awareness training to recognize and avoid opening suspicious files or links. Additionally, consider isolating REDCap instances within secure network segments and enforcing multi-factor authentication to reduce the risk of session hijacking. Regularly audit and review logs for signs of exploitation attempts. Since no known exploits are reported, proactive patching and hardening are the most effective defenses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-10T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec493

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:27:10 PM

Last updated: 8/17/2025, 10:00:32 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats