Skip to main content

CVE-2022-43076: n/a in n/a

Medium
VulnerabilityCVE-2022-43076cvecve-2022-43076
Published: Tue Nov 01 2022 (11/01/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

A cross-site scripting (XSS) vulnerability in /admin/edit-admin.php of Web-Based Student Clearance System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the txtemail parameter.

AI-Powered Analysis

AILast updated: 07/07/2025, 00:11:27 UTC

Technical Analysis

CVE-2022-43076 is a cross-site scripting (XSS) vulnerability identified in the /admin/edit-admin.php page of the Web-Based Student Clearance System version 1.0. This vulnerability arises due to insufficient input validation or output encoding of the txtemail parameter, which allows an attacker to inject arbitrary web scripts or HTML code. When a crafted payload is submitted via this parameter, it can be executed in the context of the victim's browser session. The vulnerability is categorized under CWE-79, which is a common weakness related to improper neutralization of input during web page generation. The CVSS v3.1 base score is 4.8 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H) and user interaction (UI:R), with a scope change (S:C), and limited impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). No patches or known exploits in the wild have been reported to date. The vulnerability affects a niche product used for student clearance management, which is likely deployed in educational institutions or administrative environments.

Potential Impact

For European organizations, particularly educational institutions or administrative bodies using the Web-Based Student Clearance System v1.0, this vulnerability could allow attackers with high privileges (such as an insider or compromised admin account) to execute malicious scripts in the context of the web application. This could lead to session hijacking, defacement, or unauthorized actions performed with the privileges of the victim user. Although the impact on confidentiality and integrity is limited, the scope change indicates that the vulnerability could affect resources beyond the initially vulnerable component, potentially compromising other parts of the system or user sessions. Given the requirement for high privileges and user interaction, the threat is somewhat constrained but still significant in environments where administrative users access the system regularly. The lack of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks. European educational institutions handling sensitive student data could face reputational damage and regulatory scrutiny if exploited.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict input validation and output encoding on the txtemail parameter to neutralize any injected scripts or HTML. Employing a web application firewall (WAF) with rules to detect and block XSS payloads targeting this parameter can provide an additional layer of defense. Since no official patches are available, administrators should consider restricting access to the /admin/edit-admin.php page to trusted IP addresses and enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of privilege misuse. Regular security audits and code reviews of the web application should be conducted to identify and remediate similar vulnerabilities. Additionally, educating administrative users about the risks of interacting with suspicious inputs and ensuring secure session management practices will help limit the impact of potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc34e

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/7/2025, 12:11:27 AM

Last updated: 7/29/2025, 4:58:46 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats