Skip to main content

CVE-2023-7215: CWE-79 Cross Site Scripting in Chanzhaoyu chatgpt-web

Low
VulnerabilityCVE-2023-7215cvecve-2023-7215cwe-79
Published: Mon Jan 08 2024 (01/08/2024, 01:31:03 UTC)
Source: CVE Database V5
Vendor/Project: Chanzhaoyu
Product: chatgpt-web

Description

A vulnerability, which was classified as problematic, has been found in Chanzhaoyu chatgpt-web 2.11.1. This issue affects some unknown processing. The manipulation of the argument Description with the input <image src onerror=prompt(document.domain)> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249779.

AI-Powered Analysis

AILast updated: 07/04/2025, 01:54:58 UTC

Technical Analysis

CVE-2023-7215 is a cross-site scripting (XSS) vulnerability identified in version 2.11.1 of the Chanzhaoyu chatgpt-web application. The vulnerability arises from improper input validation and sanitization of the 'Description' argument, which allows an attacker to inject malicious HTML/JavaScript code. Specifically, the exploit involves injecting an image tag with an onerror event handler, such as <image src onerror=prompt(document.domain)>, which triggers a JavaScript prompt displaying the domain name. This vulnerability is classified under CWE-79, indicating it is a reflected or stored XSS issue. The attack can be initiated remotely without requiring authentication, but user interaction is necessary to trigger the malicious script execution (e.g., by viewing a crafted page or input). The CVSS v3.1 base score is 3.5, indicating a low severity level, primarily because the impact on confidentiality is none, integrity impact is low, and availability impact is none. The vulnerability does not appear to have known exploits in the wild yet, and no official patches have been linked or published at this time. However, the public disclosure of the exploit details increases the risk of exploitation attempts. The vulnerability could allow attackers to execute arbitrary scripts in the context of the victim's browser session, potentially leading to session hijacking, phishing, or defacement if combined with other weaknesses.

Potential Impact

For European organizations using the Chanzhaoyu chatgpt-web 2.11.1 application, this vulnerability could lead to targeted XSS attacks that compromise user sessions or trick users into performing unintended actions. While the direct impact on confidentiality is minimal, the integrity of user interactions and data could be compromised. Attackers could leverage this vulnerability to conduct social engineering attacks or steal session tokens if the application handles sensitive data or authentication cookies insecurely. The risk is heightened in environments where chatgpt-web is integrated with internal communication or customer-facing portals, potentially exposing employees or customers to malicious scripts. Given the low CVSS score and the requirement for user interaction, the threat is moderate but should not be ignored, especially in sectors with strict data protection regulations such as GDPR. Failure to address this vulnerability could lead to reputational damage and regulatory scrutiny if exploited to compromise personal data.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict input validation and output encoding on all user-supplied data, particularly the 'Description' field in chatgpt-web. Employing Content Security Policy (CSP) headers can reduce the impact of XSS by restricting the execution of unauthorized scripts. Regularly updating the application to the latest version once a patch is released is critical. In the absence of an official patch, organizations should consider applying temporary workarounds such as disabling or sanitizing the affected input fields, or using web application firewalls (WAFs) configured to detect and block typical XSS payloads. Additionally, educating users about the risks of interacting with suspicious links or inputs can reduce the likelihood of successful exploitation. Monitoring logs for unusual activity related to the Description parameter can help detect attempted attacks early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-05T12:56:44.805Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc2182aa0cae27ff3f9

Added to database: 6/3/2025, 2:59:14 PM

Last enriched: 7/4/2025, 1:54:58 AM

Last updated: 8/11/2025, 2:57:04 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats