CRITICALCVE-2022-1346CVSS 9

Multiple Stored XSS in causefx/organizr

traduzindo…

Plataforma

other

Componente

organizr

Corrigido em

2.1.1810

AI Confidence: highNVDEPSS 0.4%Revisado: mai. de 2026
Traduzindo para o seu idioma…

CVE-2022-1346 describes multiple stored Cross-Site Scripting (XSS) vulnerabilities within the causefx/organizr GitHub repository. These vulnerabilities allow attackers to inject malicious scripts into the application, potentially compromising user accounts and sensitive data. The vulnerability affects versions of Organizr up to and including 2.1.1810. A fix has been released in version 2.1.1810.

Impacto e Cenários de Ataquetraduzindo…

The XSS vulnerabilities in Organizr allow an attacker to inject arbitrary JavaScript code into the application's interface. This code executes within the context of the user's browser, granting the attacker the ability to steal session cookies, redirect users to malicious websites, or deface the application. Successful exploitation could lead to complete account takeover, unauthorized access to sensitive information, and further compromise of the user's system. The impact is particularly severe given the potential for widespread user compromise if Organizr is deployed within an organization.

Contexto de Exploraçãotraduzindo…

CVE-2022-1346 was publicly disclosed on April 13, 2022. While no active exploitation campaigns have been definitively linked to this vulnerability, the CRITICAL severity and ease of exploitation make it a high-priority target. No public proof-of-concept exploits were immediately available, but the nature of XSS vulnerabilities means that such exploits are likely to emerge. This CVE is not currently listed on CISA KEV.

Quem Está em Riscotraduzindo…

Organizations and individuals using Organizr for task management and organization are at risk. This includes teams relying on the application for project tracking, personal users utilizing it for to-do lists, and potentially shared hosting environments where multiple users share the same instance of Organizr.

Passos de Detecçãotraduzindo…

• generic web: Check for suspicious JavaScript code in the application's source code or rendered HTML. Use browser developer tools to inspect network requests and responses for unexpected scripts. • generic web: Examine access and error logs for patterns indicative of XSS attempts, such as unusual characters or script tags in user input. • generic web: Use curl/wget to test various input fields with basic XSS payloads (e.g., <script>alert(1)</script>) and observe the response for script execution.

Linha do Tempo do Ataque

  1. Disclosure

    disclosure

Inteligência de Ameaças

Status do Exploit

Prova de ConceitoDesconhecido
CISA KEVNO
Exposição na InternetAlta

EPSS

0.37% (percentil 59%)

Vetor CVSS

INTELIGÊNCIA DE AMEAÇAS· CVSS 3.1CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H9.0CRITICALAttack VectorNetworkComo o atacante alcança o alvoAttack ComplexityLowCondições necessárias para explorarPrivileges RequiredLowNível de autenticação necessárioUser InteractionRequiredSe a vítima precisa tomar uma açãoScopeChangedImpacto além do componente afetadoConfidentialityHighRisco de exposição de dados sensíveisIntegrityHighRisco de modificação não autorizada de dadosAvailabilityHighRisco de interrupção de serviçonextguardhq.com · Pontuação Base CVSS v3.1
O que significam essas métricas?
Attack Vector
Rede — explorável remotamente pela internet. Sem acesso físico ou local necessário.
Attack Complexity
Baixa — sem condições especiais. O atacante pode explorar de forma confiável.
Privileges Required
Baixo — qualquer conta de usuário válida é suficiente.
User Interaction
Necessária — a vítima deve abrir um arquivo, clicar em um link ou visitar uma página.
Scope
Alterado — o ataque pode pivotar para além do componente vulnerável.
Confidentiality
Alto — perda total de confidencialidade. O atacante pode ler todos os dados.
Integrity
Alto — o atacante pode escrever, modificar ou excluir qualquer dado.
Availability
Alto — falha completa ou esgotamento de recursos. Negação de serviço total.

Software Afetado

Componenteorganizr
Fornecedorcausefx
Faixa afetadaCorrigido em
unspecified – 2.1.18102.1.1810

Classificação de Fraqueza (CWE)

Linha do tempo

  1. Reservado
  2. Publicada
  3. Modificada
  4. EPSS atualizado

Mitigação e Soluções Alternativastraduzindo…

The primary mitigation for CVE-2022-1346 is to immediately upgrade Organizr to version 2.1.1810 or later. If upgrading is not immediately feasible, consider implementing strict input validation and output encoding on all user-supplied data within the application. While not a complete solution, this can help reduce the attack surface. Web application firewalls (WAFs) configured with rules to detect and block XSS payloads can also provide an additional layer of defense. After upgrading, verify the fix by attempting to inject a simple XSS payload (e.g., <script>alert(1)</script>) into various input fields and confirming that the script is not executed.

Como corrigirtraduzindo…

Actualice Organizr a la versión 2.1.1810 o posterior. Esta versión contiene una corrección para la vulnerabilidad XSS almacenada. La actualización se puede realizar a través de la interfaz de administración de Organizr o descargando la última versión del repositorio de GitHub y siguiendo las instrucciones de instalación.

Boletim de Segurança CVE

Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.

Perguntas frequentestraduzindo…

What is CVE-2022-1346 — XSS in Organizr ≤2.1.1810?

CVE-2022-1346 is a critical stored XSS vulnerability in Organizr versions 2.1.1810 and earlier, allowing attackers to execute malicious scripts in user browsers.

Am I affected by CVE-2022-1346 in Organizr ≤2.1.1810?

Yes, if you are using Organizr version 2.1.1810 or earlier, you are vulnerable to this XSS attack.

How do I fix CVE-2022-1346 in Organizr ≤2.1.1810?

Upgrade Organizr to version 2.1.1810 or later to resolve the vulnerability. Implement input validation and output encoding as a temporary mitigation.

Is CVE-2022-1346 being actively exploited?

While no confirmed active exploitation campaigns are known, the CRITICAL severity makes it a likely target for attackers.

Where can I find the official Organizr advisory for CVE-2022-1346?

Refer to the causefx/organizr GitHub repository for updates and advisories related to CVE-2022-1346: https://github.com/causefx/organizr

Seu projeto está afetado?

Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.