Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-31223: n/a in n/a

0
High
VulnerabilityCVE-2023-31223cvecve-2023-31223
Published: Tue Apr 25 2023 (04/25/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Dradis before 4.8.0 allows persistent XSS by authenticated author users, related to avatars.

AI-Powered Analysis

AILast updated: 07/08/2025, 15:58:45 UTC

Technical Analysis

CVE-2023-31223 is a high-severity persistent Cross-Site Scripting (XSS) vulnerability affecting Dradis versions prior to 4.8.0. Dradis is a collaboration and reporting tool commonly used in cybersecurity and penetration testing environments to manage and share information. The vulnerability arises from insufficient sanitization of user-supplied input related to avatar handling, allowing authenticated users with author-level privileges to inject malicious scripts that persist across sessions and are executed in the browsers of other users viewing the affected content. This persistent XSS flaw is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 score of 8.7 reflects a high impact on confidentiality and integrity, with a scope change, requiring low privileges (authenticated author user) and user interaction (victim must view the malicious content). Exploitation could lead to session hijacking, credential theft, unauthorized actions on behalf of users, or deployment of further malware within the Dradis environment. Although no known exploits are currently reported in the wild, the vulnerability’s nature and ease of exploitation by authenticated users make it a significant risk, especially in environments where Dradis is used for sensitive security data collaboration.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial, particularly for those in cybersecurity, consulting, or any sector relying on Dradis for managing sensitive penetration testing data and security assessments. Exploitation could lead to unauthorized disclosure of confidential information, manipulation of reports, or compromise of user accounts, undermining trust and potentially violating data protection regulations such as GDPR. Persistent XSS can also serve as a foothold for further attacks within the network, increasing the risk of lateral movement and data breaches. Organizations with multiple users having author privileges are at higher risk, as the attack vector requires authenticated access. The potential for scope change means that the vulnerability could affect components beyond the initially compromised user session, amplifying the damage.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade Dradis to version 4.8.0 or later, where the issue has been addressed. In the absence of an immediate upgrade, administrators should restrict author-level privileges to trusted users only and monitor user activities closely. Implementing Content Security Policy (CSP) headers can help reduce the impact of XSS by restricting the execution of unauthorized scripts. Additionally, web application firewalls (WAFs) configured to detect and block XSS payloads can provide a temporary protective layer. Regular security audits and user training on safe usage practices are recommended to minimize the risk of exploitation. Finally, organizations should review and sanitize all user-generated content related to avatars and other input fields to prevent injection of malicious code.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-04-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839d93e182aa0cae2b73032

Added to database: 5/30/2025, 4:13:50 PM

Last enriched: 7/8/2025, 3:58:45 PM

Last updated: 11/28/2025, 11:19:44 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats