CVE-2026-2345

3.6 LOW

📋 TL;DR

The Proctorio Chrome Extension vulnerability allows malicious websites to send messages that the extension processes without verifying the sender's origin. This could enable attackers to manipulate the proctoring functionality or access sensitive data. Users of the Proctorio Chrome Extension are affected.

💻 Affected Systems

Products:
  • Proctorio Chrome Extension
Versions: All versions prior to patch
Operating Systems: All operating systems running Chrome
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects users with the Proctorio Chrome Extension installed and enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could bypass proctoring controls, access exam content, manipulate proctoring data, or exfiltrate sensitive information from the extension's context.

🟠

Likely Case

Malicious websites could interfere with proctoring functionality, potentially allowing exam cheating or disrupting legitimate proctoring sessions.

🟢

If Mitigated

With proper origin validation, only trusted websites could communicate with the extension, limiting attack surface to compromised legitimate proctoring sites.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires a user to visit a malicious website while the extension is active.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Chrome Web Store for latest version

Vendor Advisory: https://www.hckrt.com/hacktivity/46b61f36-b685-4667-aebf-82a67ad69ad6

Restart Required: No

Instructions:

1. Open Chrome browser
2. Go to chrome://extensions/
3. Find Proctorio extension
4. Ensure 'Developer mode' is off
5. Extension should auto-update
6. Alternatively, remove and reinstall from Chrome Web Store

🔧 Temporary Workarounds

Disable Extension

all

Temporarily disable the Proctorio extension when not actively proctoring

chrome://extensions/ → Toggle Proctorio extension OFF

Use Incognito/Private Mode

all

Only enable extension in private browsing sessions for proctoring

🧯 If You Can't Patch

  • Disable the Proctorio Chrome Extension entirely
  • Use alternative proctoring solutions that don't require browser extensions

🔍 How to Verify

Check if Vulnerable:

Check if Proctorio extension processes messages without origin validation by inspecting extension code or testing with controlled websites

Check Version:

chrome://extensions/ → Details → Version

Verify Fix Applied:

Verify extension validates event.origin in all message event handlers

📡 Detection & Monitoring

Log Indicators:

  • Unusual message events in extension console
  • Proctoring session anomalies

Network Indicators:

  • Unexpected cross-origin messaging to extension

SIEM Query:

Look for browser extension error logs containing 'postMessage' or 'message' events with suspicious origins

🔗 References

📤 Share & Export