Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2345: CWE-346 Origin Validation Error in Proctorio Secure Exam Proctor Extension

0
Low
VulnerabilityCVE-2026-2345cvecve-2026-2345cwe-346
Published: Wed Feb 11 2026 (02/11/2026, 14:49:44 UTC)
Source: CVE Database V5
Vendor/Project: Proctorio
Product: Secure Exam Proctor Extension

Description

CVE-2026-2345 is a low-severity vulnerability in the Proctorio Secure Exam Proctor Chrome extension version 1. 5. 25220. 33. The extension improperly validates the origin of incoming postMessage events by relying only on a fromWebsite property without verifying the event. origin attribute. This origin validation error (CWE-346) could allow malicious web pages to send crafted messages to the extension, potentially leading to limited information disclosure or manipulation of internal messaging. Exploitation requires local access (AV:L), high attack complexity (AC:H), no privileges (PR:N), and user interaction (UI:R). No known exploits are currently in the wild. The impact is limited to confidentiality and integrity with no availability impact.

AI-Powered Analysis

AILast updated: 02/11/2026, 15:30:54 UTC

Technical Analysis

The Proctorio Secure Exam Proctor Chrome extension version 1.5.25220.33 contains a vulnerability identified as CVE-2026-2345, classified under CWE-346 (Origin Validation Error). The extension uses multiple window.addEventListener('message', ...) handlers to facilitate internal communication. However, these handlers fail to properly validate the origin of incoming postMessage events. Specifically, the extension processes messages based solely on the presence of a fromWebsite property within the message payload, neglecting to verify the event.origin attribute, which is critical for ensuring messages come from trusted sources. This improper origin validation can allow a malicious website or attacker-controlled page to send crafted messages to the extension, potentially triggering unintended behaviors or leaking sensitive information related to the exam environment. The vulnerability has a CVSS 3.1 base score of 3.6, indicating low severity. The attack vector is local (AV:L), meaning the attacker must have local access to the victim's browser environment, and the attack complexity is high (AC:H), requiring specific conditions or user interaction (UI:R). No privileges are required (PR:N), so any user can be targeted. There are no known exploits in the wild at this time, and no patches have been published yet. Given the extension's role in securing online exams, any manipulation or information leakage could undermine exam integrity or privacy. The vulnerability primarily impacts confidentiality and integrity but does not affect availability. The issue highlights the importance of strict origin validation in browser extension messaging to prevent cross-origin attacks and unauthorized message injection.

Potential Impact

For European organizations, particularly educational institutions relying on Proctorio for secure online examinations, this vulnerability poses risks to the confidentiality and integrity of exam processes. An attacker who can lure a user to a malicious website or inject scripts in the browser context could exploit the origin validation flaw to send unauthorized messages to the extension. This could lead to leakage of exam-related data or manipulation of the extension's behavior, potentially compromising exam fairness or privacy. Although the attack requires local access and user interaction, the widespread use of Proctorio in European universities and certification bodies increases the attack surface. The impact is mitigated by the high attack complexity and lack of known exploits, but the sensitive nature of exam environments means even low-severity vulnerabilities warrant attention. Disruption or data leakage could damage institutional reputation and trust in online assessment platforms. Additionally, regulatory frameworks like GDPR emphasize protecting personal data, so any leakage could have compliance implications.

Mitigation Recommendations

Organizations should monitor Proctorio vendor communications for patches addressing this vulnerability and apply updates promptly once available. Until a patch is released, users should be advised to avoid visiting untrusted websites during exam sessions to reduce the risk of malicious message injection. Security teams can audit browser extension configurations and restrict extension permissions where possible. Developers and administrators should advocate for or implement strict origin validation in all message event handlers, ensuring event.origin is checked against a whitelist of trusted domains before processing messages. Employing browser security features such as Content Security Policy (CSP) can help limit exposure to malicious scripts. User education is critical to prevent social engineering that might lead to exploitation. Finally, institutions should consider layered security controls around exam environments, including network segmentation and endpoint protection, to reduce the likelihood of local attacker presence.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Hackrate
Date Reserved
2026-02-11T14:45:32.162Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698c9d454b57a58fa19f3847

Added to database: 2/11/2026, 3:16:21 PM

Last enriched: 2/11/2026, 3:30:54 PM

Last updated: 2/11/2026, 6:46:43 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats