CVE-2022-31193
Java vulnerability analysis and mitigation

Overview

The DSpace JSPUI (Java Server Pages User Interface) controlled vocabulary servlet was found to be vulnerable to an open redirect attack in versions 4.0 through 6.3. This vulnerability, identified as CVE-2022-31193, was discovered and reported by Johannes Moritz of Ripstech. The issue allows attackers to craft malicious URLs that appear legitimate but redirect users to arbitrary external websites. The vulnerability was disclosed on July 29, 2022 and affects only the JSPUI component, not the XMLUI or 7.x versions (GitHub Advisory).

Technical details

The vulnerability exists in the controlled vocabulary servlet's URL handling mechanism where insufficient validation of the callerUrl parameter allows redirection to external URLs. The issue stems from a lack of proper validation to ensure redirects remain within the DSpace web application context. The vulnerability has been assigned a High severity rating due to its potential for phishing attacks (GitHub Advisory).

Impact

An attacker can exploit this vulnerability to perform phishing attacks by creating malicious URLs that appear to be legitimate DSpace/repository URLs. When users click these URLs, they are redirected to arbitrary external websites controlled by the attacker. This could lead to credential theft or other malicious activities through social engineering (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in DSpace versions 6.4 and 5.11. For users unable to upgrade immediately, patches are available via commits f775845 for version 6.x and 5f72424 for version 5.x. The fix involves adding validation to ensure the callerUrl parameter starts with the DSpace request context path. Users are advised to either upgrade to the patched versions or apply the available patches manually (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66516CRITICAL10
  • JavaJava
  • tika
NoYesDec 04, 2025
CVE-2025-66566HIGH8.2
  • JavaJava
  • org.lz4:lz4-java
NoYesDec 05, 2025
CVE-2025-66623HIGH7.4
  • JavaJava
  • io.strimzi:strimzi
NoYesDec 05, 2025
CVE-2025-11222MEDIUM6.1
  • JavaJava
  • com.linecorp.centraldogma:centraldogma-server-auth-shiro
NoYesDec 04, 2025
CVE-2025-66453MEDIUM5.5
  • JavaJava
  • org.mozilla:rhino
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management