CVE-2022-42750: Stored cross-site scripting (XSS) in CandidATS
CandidATS version 3.0.0 allows an external attacker to steal the cookie of arbitrary users. This is possible because the application does not correctly validate the files uploaded by the user.
AI Analysis
Technical Summary
CVE-2022-42750 is a high-severity stored cross-site scripting (XSS) vulnerability affecting CandidATS version 3.0.0. This vulnerability arises because the application does not properly validate files uploaded by users, allowing an attacker to inject malicious scripts that are stored and subsequently executed in the context of other users' browsers. Specifically, an external attacker can exploit this flaw to steal cookies from arbitrary users, which can lead to session hijacking and unauthorized access to user accounts. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 score of 8.8 reflects the critical impact on confidentiality, integrity, and availability, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but user interaction is necessary (e.g., victim must open a malicious file or page). The scope is unchanged, meaning the vulnerability affects only the vulnerable component. Although no known exploits are currently reported in the wild, the potential for exploitation is significant given the nature of stored XSS and the ability to steal sensitive session cookies. The lack of patch links suggests that a fix may not yet be publicly available or is pending release.
Potential Impact
For European organizations using CandidATS 3.0.0, this vulnerability poses a serious risk. CandidATS is typically used for applicant tracking and recruitment management, meaning that compromised accounts could expose sensitive personal data of job applicants and employees, violating GDPR and other data protection regulations. The ability to steal session cookies can lead to unauthorized access to administrative or user accounts, potentially allowing attackers to manipulate recruitment data, disrupt hiring processes, or exfiltrate confidential information. This could result in reputational damage, regulatory fines, and operational disruption. Additionally, if attackers leverage this vulnerability to implant further malware or pivot within the network, the impact could extend beyond the application itself. Given the remote exploitation vector and low complexity, attackers can target organizations without needing internal access, increasing the threat surface.
Mitigation Recommendations
Organizations should immediately assess their use of CandidATS and identify any instances running version 3.0.0. In the absence of an official patch, mitigating controls include implementing strict input validation and sanitization on file uploads to prevent malicious script injection. Web application firewalls (WAFs) can be configured to detect and block common XSS payloads targeting the application. Additionally, enforcing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. User awareness training should emphasize caution when interacting with files or links within the ATS platform. Monitoring logs for unusual activity related to file uploads or user sessions can help detect exploitation attempts. Organizations should also engage with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2022-42750: Stored cross-site scripting (XSS) in CandidATS
Description
CandidATS version 3.0.0 allows an external attacker to steal the cookie of arbitrary users. This is possible because the application does not correctly validate the files uploaded by the user.
AI-Powered Analysis
Technical Analysis
CVE-2022-42750 is a high-severity stored cross-site scripting (XSS) vulnerability affecting CandidATS version 3.0.0. This vulnerability arises because the application does not properly validate files uploaded by users, allowing an attacker to inject malicious scripts that are stored and subsequently executed in the context of other users' browsers. Specifically, an external attacker can exploit this flaw to steal cookies from arbitrary users, which can lead to session hijacking and unauthorized access to user accounts. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 score of 8.8 reflects the critical impact on confidentiality, integrity, and availability, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but user interaction is necessary (e.g., victim must open a malicious file or page). The scope is unchanged, meaning the vulnerability affects only the vulnerable component. Although no known exploits are currently reported in the wild, the potential for exploitation is significant given the nature of stored XSS and the ability to steal sensitive session cookies. The lack of patch links suggests that a fix may not yet be publicly available or is pending release.
Potential Impact
For European organizations using CandidATS 3.0.0, this vulnerability poses a serious risk. CandidATS is typically used for applicant tracking and recruitment management, meaning that compromised accounts could expose sensitive personal data of job applicants and employees, violating GDPR and other data protection regulations. The ability to steal session cookies can lead to unauthorized access to administrative or user accounts, potentially allowing attackers to manipulate recruitment data, disrupt hiring processes, or exfiltrate confidential information. This could result in reputational damage, regulatory fines, and operational disruption. Additionally, if attackers leverage this vulnerability to implant further malware or pivot within the network, the impact could extend beyond the application itself. Given the remote exploitation vector and low complexity, attackers can target organizations without needing internal access, increasing the threat surface.
Mitigation Recommendations
Organizations should immediately assess their use of CandidATS and identify any instances running version 3.0.0. In the absence of an official patch, mitigating controls include implementing strict input validation and sanitization on file uploads to prevent malicious script injection. Web application firewalls (WAFs) can be configured to detect and block common XSS payloads targeting the application. Additionally, enforcing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. User awareness training should emphasize caution when interacting with files or links within the ATS platform. Monitoring logs for unusual activity related to file uploads or user sessions can help detect exploitation attempts. Organizations should also engage with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Fluid Attacks
- Date Reserved
- 2022-10-10T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdcbd0
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/3/2025, 1:57:45 PM
Last updated: 2/7/2026, 10:08:38 AM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.