CVE-2022-4957: CWE-79 Cross Site Scripting in librespeed speedtest
A vulnerability was found in librespeed speedtest up to 5.2.4. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file results/stats.php. The manipulation of the argument id leads to cross site scripting. The attack can be launched remotely. Upgrading to version 5.2.5 is able to address this issue. The patch is named a85f2c086f3449dffa8fe2edb5e2ef3ee72dc0e9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-246643.
AI Analysis
Technical Summary
CVE-2022-4957 is a cross-site scripting (XSS) vulnerability identified in the librespeed speedtest application, specifically affecting versions 5.2.0 through 5.2.4. The vulnerability resides in the results/stats.php file, where improper sanitization of the 'id' parameter allows an attacker to inject malicious scripts. This vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation, leading to XSS attacks. An attacker can exploit this remotely by manipulating the 'id' argument in HTTP requests to execute arbitrary JavaScript in the context of the victim's browser. The vulnerability requires low privileges (PR:L) and user interaction (UI:R), meaning the attacker must trick a user into clicking a crafted link or visiting a malicious page. The CVSS 3.1 base score is 3.5, indicating a low severity primarily due to the limited impact on confidentiality and availability, and the requirement for user interaction and privileges. The integrity impact is low, as the attacker can execute scripts but cannot directly alter server-side data. No known exploits are currently reported in the wild. The issue is addressed in version 5.2.5 of librespeed speedtest, with a patch identified by commit a85f2c086f3449dffa8fe2edb5e2ef3ee72dc0e9. Organizations using affected versions should upgrade promptly to mitigate this risk.
Potential Impact
For European organizations, the impact of this XSS vulnerability is generally low but should not be underestimated. Successful exploitation could allow attackers to perform actions such as session hijacking, phishing, or delivering malicious payloads to users interacting with the speedtest application. This could lead to compromised user accounts or unauthorized actions within the application context. While the vulnerability does not directly affect system confidentiality or availability, it can be a stepping stone for more sophisticated attacks, especially if the speedtest service is integrated into broader network monitoring or diagnostic platforms. Organizations relying on librespeed speedtest for internal or customer-facing services may face reputational damage if users are targeted via this vulnerability. Additionally, regulatory frameworks such as GDPR require organizations to maintain secure processing environments; failure to patch known vulnerabilities could lead to compliance issues. Given that the attack requires user interaction and some privilege level, the risk is mitigated but still present, particularly in environments with less security awareness or where the speedtest is publicly accessible.
Mitigation Recommendations
1. Immediate upgrade to librespeed speedtest version 5.2.5 or later, which contains the patch addressing this vulnerability. 2. Implement strict input validation and output encoding on all user-supplied inputs, especially parameters like 'id' in results/stats.php, to prevent script injection. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the speedtest application. 4. Conduct user awareness training to reduce the likelihood of users clicking on suspicious links that could exploit this vulnerability. 5. Monitor web application logs for unusual parameter values or repeated attempts to inject scripts via the 'id' parameter. 6. If upgrading immediately is not feasible, consider restricting access to the speedtest application to trusted internal networks or authenticated users only, reducing exposure. 7. Regularly review and update web application security configurations and perform periodic vulnerability assessments to detect similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium
CVE-2022-4957: CWE-79 Cross Site Scripting in librespeed speedtest
Description
A vulnerability was found in librespeed speedtest up to 5.2.4. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file results/stats.php. The manipulation of the argument id leads to cross site scripting. The attack can be launched remotely. Upgrading to version 5.2.5 is able to address this issue. The patch is named a85f2c086f3449dffa8fe2edb5e2ef3ee72dc0e9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-246643.
AI-Powered Analysis
Technical Analysis
CVE-2022-4957 is a cross-site scripting (XSS) vulnerability identified in the librespeed speedtest application, specifically affecting versions 5.2.0 through 5.2.4. The vulnerability resides in the results/stats.php file, where improper sanitization of the 'id' parameter allows an attacker to inject malicious scripts. This vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation, leading to XSS attacks. An attacker can exploit this remotely by manipulating the 'id' argument in HTTP requests to execute arbitrary JavaScript in the context of the victim's browser. The vulnerability requires low privileges (PR:L) and user interaction (UI:R), meaning the attacker must trick a user into clicking a crafted link or visiting a malicious page. The CVSS 3.1 base score is 3.5, indicating a low severity primarily due to the limited impact on confidentiality and availability, and the requirement for user interaction and privileges. The integrity impact is low, as the attacker can execute scripts but cannot directly alter server-side data. No known exploits are currently reported in the wild. The issue is addressed in version 5.2.5 of librespeed speedtest, with a patch identified by commit a85f2c086f3449dffa8fe2edb5e2ef3ee72dc0e9. Organizations using affected versions should upgrade promptly to mitigate this risk.
Potential Impact
For European organizations, the impact of this XSS vulnerability is generally low but should not be underestimated. Successful exploitation could allow attackers to perform actions such as session hijacking, phishing, or delivering malicious payloads to users interacting with the speedtest application. This could lead to compromised user accounts or unauthorized actions within the application context. While the vulnerability does not directly affect system confidentiality or availability, it can be a stepping stone for more sophisticated attacks, especially if the speedtest service is integrated into broader network monitoring or diagnostic platforms. Organizations relying on librespeed speedtest for internal or customer-facing services may face reputational damage if users are targeted via this vulnerability. Additionally, regulatory frameworks such as GDPR require organizations to maintain secure processing environments; failure to patch known vulnerabilities could lead to compliance issues. Given that the attack requires user interaction and some privilege level, the risk is mitigated but still present, particularly in environments with less security awareness or where the speedtest is publicly accessible.
Mitigation Recommendations
1. Immediate upgrade to librespeed speedtest version 5.2.5 or later, which contains the patch addressing this vulnerability. 2. Implement strict input validation and output encoding on all user-supplied inputs, especially parameters like 'id' in results/stats.php, to prevent script injection. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the speedtest application. 4. Conduct user awareness training to reduce the likelihood of users clicking on suspicious links that could exploit this vulnerability. 5. Monitor web application logs for unusual parameter values or repeated attempts to inject scripts via the 'id' parameter. 6. If upgrading immediately is not feasible, consider restricting access to the speedtest application to trusted internal networks or authenticated users only, reducing exposure. 7. Regularly review and update web application security configurations and perform periodic vulnerability assessments to detect similar issues proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2023-12-02T07:53:23.357Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683e5dc4182aa0cae2606b89
Added to database: 6/3/2025, 2:28:20 AM
Last enriched: 7/3/2025, 5:43:39 PM
Last updated: 12/2/2025, 9:46:43 AM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10971: CWE-922 Insecure Storage of Sensitive Information in FERMAX ELECTRÓNICA S.A.U MeetMe
HighCVE-2025-13696: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in softdiscover Zigaform – Price Calculator & Cost Estimation Form Builder Lite
MediumCVE-2025-11726: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13685: CWE-352 Cross-Site Request Forgery (CSRF) in ays-pro Photo Gallery by Ays – Responsive Image Gallery
MediumCVE-2025-13140: CWE-352 Cross-Site Request Forgery (CSRF) in devsoftbaltic SurveyJS: Drag & Drop WordPress Form Builder to create, style and embed multiple forms of any complexity
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.