CWE
79
Advisory Published
Updated

CVE-2023-31145: Reflected XSS vulnerability in CollaboraOnline

First published: Mon May 15 2023(Updated: )

Collabora Online is a collaborative online office suite based on LibreOffice technology. This vulnerability report describes a reflected XSS vulnerability with full CSP bypass in Nextcloud installations using the recommended bundle. The vulnerability can be exploited to perform a trivial account takeover attack. The vulnerability allows attackers to inject malicious code into web pages, which can be executed in the context of the victim's browser session. This means that an attacker can steal sensitive data, such as login credentials or personal information, or perform unauthorized actions on behalf of the victim, such as modifying or deleting data. In this specific case, the vulnerability allows for a trivial account takeover attack. An attacker can exploit the vulnerability to inject code into the victim's browser session, allowing the attacker to take over the victim's account without their knowledge or consent. This can lead to unauthorized access to sensitive information and data, as well as the ability to perform actions on behalf of the victim. Furthermore, the fact that the vulnerability bypasses the Content Security Policy (CSP) makes it more dangerous, as CSP is an important security mechanism used to prevent cross-site scripting attacks. By bypassing CSP, attackers can circumvent the security measures put in place by the web application and execute their malicious code. This issue has been patched in versions 22.05.13, 21.11.9, and 6.4.27. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Collabora Office Online<6.4.27
Collabora Office Online>=21.06.2<21.11.9
Collabora Office Online>=22.05.0<22.05.13

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2023-31145?

    The severity of CVE-2023-31145 is considered high due to its ability to exploit a reflected XSS vulnerability with full CSP bypass.

  • How can I fix CVE-2023-31145?

    To fix CVE-2023-31145, update Collabora Online to a version above 6.4.27 or ensure versions are not within the vulnerable ranges of 21.06.2 to 21.11.9 and 22.05.0 to 22.05.13.

  • What types of software are affected by CVE-2023-31145?

    CVE-2023-31145 affects all versions of Collabora Online up to 6.4.27 and specific versions between 21.06.2 to 21.11.9 and 22.05.0 to 22.05.13.

  • Can CVE-2023-31145 lead to data breaches?

    Yes, CVE-2023-31145 can potentially lead to data breaches by allowing attackers to execute malicious scripts in the context of a user's browser.

  • Is user interaction required to exploit CVE-2023-31145?

    Yes, exploiting CVE-2023-31145 typically requires user interaction, such as clicking on a malicious link.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203