Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-43983: Server Side XSS in Browsershot

0
High
VulnerabilityCVE-2022-43983cvecve-2022-43983
Published: Fri Nov 25 2022 (11/25/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: Browsershot

Description

Browsershot version 3.57.2 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate that the HTML content passed to the Browsershot::html method does not contain URL's that use the file:// protocol.

AI-Powered Analysis

AILast updated: 06/22/2025, 10:50:58 UTC

Technical Analysis

CVE-2022-43983 is a high-severity vulnerability affecting Browsershot version 3.57.2, a PHP package commonly used to convert HTML content into images or PDFs by leveraging headless browser technology. The vulnerability arises because Browsershot does not properly validate HTML content passed to its Browsershot::html method, specifically failing to restrict URLs that use the file:// protocol. This oversight enables an external attacker to craft malicious HTML input containing file:// URLs, which the Browsershot process then loads. Since Browsershot runs server-side, this can lead to unauthorized access and exfiltration of arbitrary local files from the server hosting the application. Technically, this is a Server-Side Cross-Site Scripting (SSXSS) variant where the attacker injects malicious content that the server processes, leading to local file disclosure. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), indicating that the root cause is insufficient input sanitization. The CVSS 3.1 base score of 8.2 reflects a high severity, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but requiring user interaction (the attacker must supply crafted HTML content). The scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality is high due to arbitrary local file disclosure, integrity impact is low, and availability is not affected. No known exploits in the wild have been reported yet, but the potential for exploitation exists given the ease of triggering the vulnerability remotely and the sensitive nature of local files that could be exposed.

Potential Impact

For European organizations, the impact of CVE-2022-43983 can be significant, especially for those relying on Browsershot in web applications, content management systems, or automated document generation workflows. The ability to remotely read arbitrary local files can lead to exposure of sensitive information such as configuration files, credentials, private keys, or personal data protected under GDPR. This could result in data breaches, regulatory fines, reputational damage, and potential lateral movement by attackers within the network. Organizations in sectors like finance, healthcare, government, and critical infrastructure are particularly at risk due to the sensitive nature of their data and the strict regulatory environment in Europe. Additionally, since the vulnerability requires user interaction (i.e., supplying malicious HTML content), applications that accept user-generated content or integrate third-party inputs without proper validation are more vulnerable. The changed scope means that the vulnerability could affect other components or systems beyond the immediate Browsershot usage, potentially amplifying the impact. Although no exploits are currently known in the wild, the high CVSS score and straightforward exploitation vector suggest that attackers could develop effective exploits, increasing the urgency for mitigation.

Mitigation Recommendations

To mitigate CVE-2022-43983, European organizations should take the following specific actions: 1) Upgrade Browsershot to a patched version if available; if no official patch exists, consider applying custom input validation to sanitize or reject any HTML content containing file:// URLs before passing it to Browsershot::html. 2) Implement strict input validation and sanitization on all user-supplied HTML content, explicitly disallowing file:// protocol URLs or any local resource references. 3) Employ application-layer whitelisting to restrict the types of URLs and resources that can be processed by Browsershot. 4) Run Browsershot processes with the least privilege principle, ensuring that the underlying system user has minimal file system access rights to limit the scope of potential file disclosure. 5) Monitor application logs and network traffic for unusual requests containing file:// URLs or suspicious HTML payloads. 6) Isolate the Browsershot execution environment using containerization or sandboxing to contain potential exploitation impact. 7) Conduct regular security assessments and code reviews focusing on third-party library usage and input handling. 8) Educate developers and security teams about the risks of server-side HTML rendering vulnerabilities and the importance of secure coding practices related to external content processing.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Fluid Attacks
Date Reserved
2022-10-28T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbeee18

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/22/2025, 10:50:58 AM

Last updated: 2/3/2026, 11:27:06 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats