CVE-2022-43167: n/a in n/a
A stored cross-site scripting (XSS) vulnerability in the Users Alerts feature (/index.php?module=users_alerts/users_alerts) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter after clicking "Add".
AI Analysis
Technical Summary
CVE-2022-43167 is a stored cross-site scripting (XSS) vulnerability identified in the Users Alerts feature of Rukovoditel version 3.2.1. Rukovoditel is a web-based project management and CRM tool. The vulnerability exists in the handling of the Title parameter within the /index.php?module=users_alerts/users_alerts endpoint. Authenticated attackers can inject malicious scripts or HTML payloads into the Title field when adding a new alert. Because this is a stored XSS, the injected payload is saved on the server and executed in the browsers of users who view the affected alert, potentially leading to session hijacking, credential theft, or further exploitation within the application context. The CVSS 3.1 base score is 5.4 (medium severity), with an attack vector of network (remote), low attack complexity, requiring privileges (authenticated user), and user interaction (victim must click to trigger the payload). The vulnerability impacts confidentiality and integrity but not availability. No public exploits are known at this time, and no official patches have been linked in the provided data. The CWE classification is CWE-79, which corresponds to improper neutralization of input leading to XSS. The vulnerability's scope is 'changed' (S:C), indicating that the vulnerability affects resources beyond the security scope of the vulnerable component, potentially impacting other users.
Potential Impact
For European organizations using Rukovoditel v3.2.1, this vulnerability poses a moderate risk. Since exploitation requires authenticated access, the threat is primarily from insiders or attackers who have compromised user credentials. Successful exploitation can lead to session hijacking or unauthorized actions performed on behalf of legitimate users, potentially exposing sensitive project management or CRM data. This could result in data leakage, reputational damage, and compliance issues under GDPR if personal data is involved. The stored nature of the XSS means multiple users can be affected once the malicious payload is injected, increasing the risk of lateral movement or privilege escalation within the application. However, the requirement for user interaction (clicking the alert) somewhat limits the attack surface. The absence of known public exploits reduces immediate risk but does not eliminate it, especially in targeted attacks. Organizations relying on Rukovoditel for critical workflows should consider this vulnerability seriously to prevent potential compromise.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the Users Alerts feature to only trusted and necessary users to reduce the risk of malicious input. 2. Implement input validation and output encoding on the Title parameter to neutralize any injected scripts or HTML. This includes sanitizing inputs on the server side and encoding outputs before rendering in the browser. 3. Apply the principle of least privilege to user roles to minimize the number of users who can add alerts. 4. Monitor logs for unusual alert creation activities or unexpected script injections. 5. If possible, upgrade to a patched version of Rukovoditel once available or apply vendor-provided patches. 6. Educate users to be cautious when clicking on alerts or links within the application, especially if unexpected. 7. Employ Content Security Policy (CSP) headers to reduce the impact of XSS by restricting the execution of unauthorized scripts. 8. Conduct regular security assessments and penetration tests focusing on web application input handling and authentication controls.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2022-43167: n/a in n/a
Description
A stored cross-site scripting (XSS) vulnerability in the Users Alerts feature (/index.php?module=users_alerts/users_alerts) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter after clicking "Add".
AI-Powered Analysis
Technical Analysis
CVE-2022-43167 is a stored cross-site scripting (XSS) vulnerability identified in the Users Alerts feature of Rukovoditel version 3.2.1. Rukovoditel is a web-based project management and CRM tool. The vulnerability exists in the handling of the Title parameter within the /index.php?module=users_alerts/users_alerts endpoint. Authenticated attackers can inject malicious scripts or HTML payloads into the Title field when adding a new alert. Because this is a stored XSS, the injected payload is saved on the server and executed in the browsers of users who view the affected alert, potentially leading to session hijacking, credential theft, or further exploitation within the application context. The CVSS 3.1 base score is 5.4 (medium severity), with an attack vector of network (remote), low attack complexity, requiring privileges (authenticated user), and user interaction (victim must click to trigger the payload). The vulnerability impacts confidentiality and integrity but not availability. No public exploits are known at this time, and no official patches have been linked in the provided data. The CWE classification is CWE-79, which corresponds to improper neutralization of input leading to XSS. The vulnerability's scope is 'changed' (S:C), indicating that the vulnerability affects resources beyond the security scope of the vulnerable component, potentially impacting other users.
Potential Impact
For European organizations using Rukovoditel v3.2.1, this vulnerability poses a moderate risk. Since exploitation requires authenticated access, the threat is primarily from insiders or attackers who have compromised user credentials. Successful exploitation can lead to session hijacking or unauthorized actions performed on behalf of legitimate users, potentially exposing sensitive project management or CRM data. This could result in data leakage, reputational damage, and compliance issues under GDPR if personal data is involved. The stored nature of the XSS means multiple users can be affected once the malicious payload is injected, increasing the risk of lateral movement or privilege escalation within the application. However, the requirement for user interaction (clicking the alert) somewhat limits the attack surface. The absence of known public exploits reduces immediate risk but does not eliminate it, especially in targeted attacks. Organizations relying on Rukovoditel for critical workflows should consider this vulnerability seriously to prevent potential compromise.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the Users Alerts feature to only trusted and necessary users to reduce the risk of malicious input. 2. Implement input validation and output encoding on the Title parameter to neutralize any injected scripts or HTML. This includes sanitizing inputs on the server side and encoding outputs before rendering in the browser. 3. Apply the principle of least privilege to user roles to minimize the number of users who can add alerts. 4. Monitor logs for unusual alert creation activities or unexpected script injections. 5. If possible, upgrade to a patched version of Rukovoditel once available or apply vendor-provided patches. 6. Educate users to be cautious when clicking on alerts or links within the application, especially if unexpected. 7. Employ Content Security Policy (CSP) headers to reduce the impact of XSS by restricting the execution of unauthorized scripts. 8. Conduct regular security assessments and penetration tests focusing on web application input handling and authentication controls.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-10-17T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9818c4522896dcbd7f03
Added to database: 5/21/2025, 9:08:40 AM
Last enriched: 7/5/2025, 3:42:17 AM
Last updated: 7/31/2025, 10:21:29 PM
Views: 13
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.