CVE-2022-29168

9.6 CRITICAL

📋 TL;DR

Wire secure messaging application is vulnerable to cross-site scripting (XSS) via insufficient escaping of @mentions. This allows attackers to inject and execute arbitrary HTML/JavaScript in victims' browsers, potentially leading to full account takeover. Affects Wire web applications and desktop clients connected to vulnerable webapp instances.

💻 Affected Systems

Products:
  • wire-webapp
  • wire-desktop
Versions: All versions before wire-webapp 2022-05-04-production.0
Operating Systems: All platforms running Wire applications
Default Config Vulnerable: ⚠️ Yes
Notes: Wire-desktop clients are vulnerable when connected to vulnerable wire-webapp instances. On-premise deployments must be updated separately.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account compromise allowing attacker to read all messages, send messages as the victim, access contacts, and potentially pivot to other systems.

🟠

Likely Case

Session hijacking, message interception, and unauthorized access to private conversations.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege access are implemented.

🌐 Internet-Facing: HIGH - Web applications are internet-accessible and vulnerable to XSS attacks.
🏢 Internal Only: MEDIUM - Internal instances still vulnerable but attack surface reduced.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires sending malicious message to victim, but XSS exploitation is well-understood and tools exist.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: wire-webapp 2022-05-04-production.0 or wire-server 2022-05-04 (chart/4.11.0)

Vendor Advisory: https://github.com/wireapp/wire-webapp/security/advisories/GHSA-jgv3-4j56-fvh6

Restart Required: Yes

Instructions:

1. Update wire-webapp to docker tag 2022-05-04-production.0-v0.29.7-0-a6f2ded or later. 2. For on-premise deployments, update wire-server to 2022-05-04 (chart/4.11.0) or later. 3. Restart all affected services.

🧯 If You Can't Patch

  • Disable @mentions functionality if possible
  • Implement strict Content Security Policy (CSP) headers to limit script execution

🔍 How to Verify

Check if Vulnerable:

Check wire-webapp version - if before 2022-05-04-production.0, vulnerable.

Check Version:

docker images | grep wire-webapp or check deployment configuration

Verify Fix Applied:

Confirm version is 2022-05-04-production.0 or later, and test @mentions functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual @mention patterns
  • Multiple failed login attempts from same user
  • Messages with suspicious HTML/JavaScript content

Network Indicators:

  • Unexpected outbound connections from Wire clients
  • Unusual message sending patterns

SIEM Query:

source="wire" AND (message="@mention" OR message CONTAINS "<script>" OR message CONTAINS "javascript:")

🔗 References

📤 Share & Export