CVE-2022-42750: Stored cross-site scripting (XSS) in CandidATS
CandidATS version 3.0.0 allows an external attacker to steal the cookie of arbitrary users. This is possible because the application does not correctly validate the files uploaded by the user.
AI Analysis
Technical Summary
CVE-2022-42750 is a high-severity stored cross-site scripting (XSS) vulnerability affecting CandidATS version 3.0.0. This vulnerability arises because the application does not properly validate files uploaded by users, allowing an attacker to inject malicious scripts that are stored and subsequently executed in the context of other users' browsers. Specifically, an external attacker can exploit this flaw to steal cookies from arbitrary users, which can lead to session hijacking and unauthorized access to user accounts. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 score of 8.8 reflects the critical impact on confidentiality, integrity, and availability, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but user interaction is necessary (e.g., victim must open a malicious file or page). The scope is unchanged, meaning the vulnerability affects only the vulnerable component. Although no known exploits are currently reported in the wild, the potential for exploitation is significant given the nature of stored XSS and the ability to steal sensitive session cookies. The lack of patch links suggests that a fix may not yet be publicly available or is pending release.
Potential Impact
For European organizations using CandidATS 3.0.0, this vulnerability poses a serious risk. CandidATS is typically used for applicant tracking and recruitment management, meaning that compromised accounts could expose sensitive personal data of job applicants and employees, violating GDPR and other data protection regulations. The ability to steal session cookies can lead to unauthorized access to administrative or user accounts, potentially allowing attackers to manipulate recruitment data, disrupt hiring processes, or exfiltrate confidential information. This could result in reputational damage, regulatory fines, and operational disruption. Additionally, if attackers leverage this vulnerability to implant further malware or pivot within the network, the impact could extend beyond the application itself. Given the remote exploitation vector and low complexity, attackers can target organizations without needing internal access, increasing the threat surface.
Mitigation Recommendations
Organizations should immediately assess their use of CandidATS and identify any instances running version 3.0.0. In the absence of an official patch, mitigating controls include implementing strict input validation and sanitization on file uploads to prevent malicious script injection. Web application firewalls (WAFs) can be configured to detect and block common XSS payloads targeting the application. Additionally, enforcing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. User awareness training should emphasize caution when interacting with files or links within the ATS platform. Monitoring logs for unusual activity related to file uploads or user sessions can help detect exploitation attempts. Organizations should also engage with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2022-42750: Stored cross-site scripting (XSS) in CandidATS
Description
CandidATS version 3.0.0 allows an external attacker to steal the cookie of arbitrary users. This is possible because the application does not correctly validate the files uploaded by the user.
AI-Powered Analysis
Technical Analysis
CVE-2022-42750 is a high-severity stored cross-site scripting (XSS) vulnerability affecting CandidATS version 3.0.0. This vulnerability arises because the application does not properly validate files uploaded by users, allowing an attacker to inject malicious scripts that are stored and subsequently executed in the context of other users' browsers. Specifically, an external attacker can exploit this flaw to steal cookies from arbitrary users, which can lead to session hijacking and unauthorized access to user accounts. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 score of 8.8 reflects the critical impact on confidentiality, integrity, and availability, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but user interaction is necessary (e.g., victim must open a malicious file or page). The scope is unchanged, meaning the vulnerability affects only the vulnerable component. Although no known exploits are currently reported in the wild, the potential for exploitation is significant given the nature of stored XSS and the ability to steal sensitive session cookies. The lack of patch links suggests that a fix may not yet be publicly available or is pending release.
Potential Impact
For European organizations using CandidATS 3.0.0, this vulnerability poses a serious risk. CandidATS is typically used for applicant tracking and recruitment management, meaning that compromised accounts could expose sensitive personal data of job applicants and employees, violating GDPR and other data protection regulations. The ability to steal session cookies can lead to unauthorized access to administrative or user accounts, potentially allowing attackers to manipulate recruitment data, disrupt hiring processes, or exfiltrate confidential information. This could result in reputational damage, regulatory fines, and operational disruption. Additionally, if attackers leverage this vulnerability to implant further malware or pivot within the network, the impact could extend beyond the application itself. Given the remote exploitation vector and low complexity, attackers can target organizations without needing internal access, increasing the threat surface.
Mitigation Recommendations
Organizations should immediately assess their use of CandidATS and identify any instances running version 3.0.0. In the absence of an official patch, mitigating controls include implementing strict input validation and sanitization on file uploads to prevent malicious script injection. Web application firewalls (WAFs) can be configured to detect and block common XSS payloads targeting the application. Additionally, enforcing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. User awareness training should emphasize caution when interacting with files or links within the ATS platform. Monitoring logs for unusual activity related to file uploads or user sessions can help detect exploitation attempts. Organizations should also engage with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Fluid Attacks
- Date Reserved
- 2022-10-10T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdcbd0
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/3/2025, 1:57:45 PM
Last updated: 7/25/2025, 6:16:12 PM
Views: 12
Related Threats
CVE-2025-8822: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-8821: OS Command Injection in Linksys RE6250
MediumCVE-2025-8817: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-8820: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-8819: Stack-based Buffer Overflow in Linksys RE6250
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.