Skip to main content

CVE-2023-35792: n/a in n/a

Medium
VulnerabilityCVE-2023-35792cvecve-2023-35792
Published: Mon Jul 31 2023 (07/31/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Vound Intella Connect 2.6.0.3 is vulnerable to stored Cross-site Scripting (XSS).

AI-Powered Analysis

AILast updated: 07/08/2025, 15:59:15 UTC

Technical Analysis

CVE-2023-35792 is a stored Cross-site Scripting (XSS) vulnerability identified in Vound Intella Connect version 2.6.0.3. Stored XSS vulnerabilities occur when malicious scripts are injected into a web application’s data storage and later executed in the browsers of users who access the affected content. In this case, the vulnerability allows an attacker with limited privileges (PR:L) to inject malicious scripts that are stored persistently and executed when other users view the compromised content. The CVSS 3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), and user interaction (UI:R) is necessary for exploitation. The vulnerability impacts confidentiality and integrity, as it can be used to steal session tokens, perform actions on behalf of users, or manipulate displayed data. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, and no patches or vendor advisories are linked in the provided data. The lack of detailed vendor or product information beyond the version and product name limits deeper technical specifics, but the nature of stored XSS typically involves insufficient input sanitization or output encoding in user-controllable fields within the application interface.

Potential Impact

For European organizations using Vound Intella Connect 2.6.0.3, this vulnerability poses a moderate risk. Stored XSS can lead to session hijacking, unauthorized actions, and data leakage, potentially compromising sensitive information handled by the platform. Since Intella Connect is a tool often used for eDiscovery and data analysis, exposure could lead to leakage of confidential legal or corporate data. The requirement for user interaction means phishing or social engineering could be used to trigger the exploit. The scope change indicates that the vulnerability could allow attackers to affect other users or components beyond the initially compromised module, increasing the risk of lateral movement or broader impact within the organization. Although no active exploitation is known, the presence of this vulnerability in environments handling sensitive or regulated data (such as GDPR-protected information) could lead to compliance violations and reputational damage if exploited.

Mitigation Recommendations

Organizations should prioritize the following actions: 1) Apply any available patches or updates from Vound as soon as they are released. If no patch is currently available, implement web application firewall (WAF) rules to detect and block typical XSS payloads targeting Intella Connect. 2) Conduct a thorough review of input validation and output encoding practices within the application, focusing on user-supplied data fields that are stored and rendered. 3) Restrict user privileges to the minimum necessary to reduce the risk of malicious input injection. 4) Educate users about the risks of interacting with suspicious links or content within the platform to mitigate social engineering vectors. 5) Monitor logs and user activity for unusual behavior that could indicate exploitation attempts. 6) Consider deploying Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the application context. 7) Engage with the vendor for detailed guidance and timelines for remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-06-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839d93e182aa0cae2b73036

Added to database: 5/30/2025, 4:13:50 PM

Last enriched: 7/8/2025, 3:59:15 PM

Last updated: 8/3/2025, 1:04:45 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats