CVE-2022-43164: n/a in n/a
A stored cross-site scripting (XSS) vulnerability in the Global Lists feature (/index.php?module=global_lists/lists) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter after clicking "Add".
AI Analysis
Technical Summary
CVE-2022-43164 is a stored cross-site scripting (XSS) vulnerability identified in the Global Lists feature of Rukovoditel version 3.2.1. Rukovoditel is a web-based project management and database application platform. The vulnerability arises when an authenticated attacker injects a crafted payload into the 'Name' parameter of the Global Lists module (/index.php?module=global_lists/lists) by clicking the 'Add' button. Because this is a stored XSS, the malicious script is saved on the server and subsequently executed in the browsers of users who view the affected page. The vulnerability requires the attacker to have valid credentials (authentication required) and user interaction (clicking 'Add') to inject the payload. The CVSS 3.1 base score is 5.4 (medium severity), with an attack vector of network (remote), low attack complexity, privileges required, user interaction required, and a scope change. The impact affects confidentiality and integrity, allowing execution of arbitrary scripts or HTML, which could lead to session hijacking, defacement, or unauthorized actions performed in the context of the victim user. There is no indication of availability impact. No public exploits are known in the wild, and no patches or vendor advisories are currently linked. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
For European organizations using Rukovoditel 3.2.1, this vulnerability poses a risk of unauthorized script execution within authenticated sessions. Attackers could leverage this to steal session tokens, perform actions on behalf of legitimate users, or conduct phishing attacks by injecting malicious content. This could lead to data leakage, unauthorized data modification, or reputational damage. Since Rukovoditel is used for project management and database applications, sensitive business data could be exposed or manipulated. The requirement for authentication limits the attack surface to internal or compromised users, but insider threats or credential compromise could facilitate exploitation. The scope change in the CVSS vector indicates that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other parts of the application or user sessions. Given the medium severity, the impact is significant but not critical, especially if compensating controls such as web application firewalls or strict input validation are in place.
Mitigation Recommendations
European organizations should immediately audit their use of Rukovoditel and identify any installations running version 3.2.1. Since no official patch is referenced, organizations should implement the following mitigations: 1) Apply strict input validation and output encoding on the 'Name' parameter in the Global Lists feature to neutralize malicious scripts. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. 3) Limit user privileges to minimize the number of users able to add or modify Global Lists entries. 4) Monitor logs for suspicious activity related to the Global Lists module, especially unexpected input patterns or repeated failed attempts. 5) Educate users about the risks of clicking untrusted links or interacting with suspicious content within the application. 6) Consider deploying a web application firewall (WAF) with rules to detect and block XSS payloads targeting this endpoint. 7) Regularly review and update authentication and session management controls to prevent session hijacking. Organizations should also track vendor communications for any forthcoming patches or updates addressing this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2022-43164: n/a in n/a
Description
A stored cross-site scripting (XSS) vulnerability in the Global Lists feature (/index.php?module=global_lists/lists) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter after clicking "Add".
AI-Powered Analysis
Technical Analysis
CVE-2022-43164 is a stored cross-site scripting (XSS) vulnerability identified in the Global Lists feature of Rukovoditel version 3.2.1. Rukovoditel is a web-based project management and database application platform. The vulnerability arises when an authenticated attacker injects a crafted payload into the 'Name' parameter of the Global Lists module (/index.php?module=global_lists/lists) by clicking the 'Add' button. Because this is a stored XSS, the malicious script is saved on the server and subsequently executed in the browsers of users who view the affected page. The vulnerability requires the attacker to have valid credentials (authentication required) and user interaction (clicking 'Add') to inject the payload. The CVSS 3.1 base score is 5.4 (medium severity), with an attack vector of network (remote), low attack complexity, privileges required, user interaction required, and a scope change. The impact affects confidentiality and integrity, allowing execution of arbitrary scripts or HTML, which could lead to session hijacking, defacement, or unauthorized actions performed in the context of the victim user. There is no indication of availability impact. No public exploits are known in the wild, and no patches or vendor advisories are currently linked. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
For European organizations using Rukovoditel 3.2.1, this vulnerability poses a risk of unauthorized script execution within authenticated sessions. Attackers could leverage this to steal session tokens, perform actions on behalf of legitimate users, or conduct phishing attacks by injecting malicious content. This could lead to data leakage, unauthorized data modification, or reputational damage. Since Rukovoditel is used for project management and database applications, sensitive business data could be exposed or manipulated. The requirement for authentication limits the attack surface to internal or compromised users, but insider threats or credential compromise could facilitate exploitation. The scope change in the CVSS vector indicates that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other parts of the application or user sessions. Given the medium severity, the impact is significant but not critical, especially if compensating controls such as web application firewalls or strict input validation are in place.
Mitigation Recommendations
European organizations should immediately audit their use of Rukovoditel and identify any installations running version 3.2.1. Since no official patch is referenced, organizations should implement the following mitigations: 1) Apply strict input validation and output encoding on the 'Name' parameter in the Global Lists feature to neutralize malicious scripts. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. 3) Limit user privileges to minimize the number of users able to add or modify Global Lists entries. 4) Monitor logs for suspicious activity related to the Global Lists module, especially unexpected input patterns or repeated failed attempts. 5) Educate users about the risks of clicking untrusted links or interacting with suspicious content within the application. 6) Consider deploying a web application firewall (WAF) with rules to detect and block XSS payloads targeting this endpoint. 7) Regularly review and update authentication and session management controls to prevent session hijacking. Organizations should also track vendor communications for any forthcoming patches or updates addressing this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-10-17T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9818c4522896dcbd7ea4
Added to database: 5/21/2025, 9:08:40 AM
Last enriched: 7/5/2025, 3:40:27 AM
Last updated: 7/31/2025, 1:55:49 AM
Views: 12
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.