Search criteria
1 vulnerability by Prowise
CVE-2022-50925 (GCVE-0-2022-50925)
Vulnerability from cvelistv5 – Published: 2026-01-13 22:51 – Updated: 2026-01-13 22:51
VLAI?
Title
Prowise Reflect v1.0.9 - Remote Keystroke Injection
Summary
Prowise Reflect version 1.0.9 contains a remote keystroke injection vulnerability that allows attackers to send keyboard events through an exposed WebSocket on port 8082. Attackers can craft malicious web pages to inject keystrokes, opening applications and typing arbitrary text by sending specific WebSocket messages.
Severity ?
9.8 (Critical)
CWE
- CWE-346 - Origin Validation Error
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Prowise | Prowise Reflect |
Affected:
V1.0.9
|
Credits
Rik Lutz
{
"containers": {
"cna": {
"affected": [
{
"product": "Prowise Reflect",
"vendor": "Prowise",
"versions": [
{
"status": "affected",
"version": "V1.0.9"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Rik Lutz"
}
],
"descriptions": [
{
"lang": "en",
"value": "Prowise Reflect version 1.0.9 contains a remote keystroke injection vulnerability that allows attackers to send keyboard events through an exposed WebSocket on port 8082. Attackers can craft malicious web pages to inject keystrokes, opening applications and typing arbitrary text by sending specific WebSocket messages."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "ACTIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS"
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-346",
"description": "Origin Validation Error",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-13T22:51:56.671Z",
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck"
},
"references": [
{
"name": "ExploitDB-50796",
"tags": [
"exploit"
],
"url": "https://www.exploit-db.com/exploits/50796"
},
{
"name": "Prowise Official Homepage",
"tags": [
"product"
],
"url": "https://www.prowise.com/"
},
{
"name": "VulnCheck Advisory: Prowise Reflect v1.0.9 - Remote Keystroke Injection",
"tags": [
"third-party-advisory"
],
"url": "https://www.vulncheck.com/advisories/prowise-reflect-remote-keystroke-injection"
}
],
"title": "Prowise Reflect v1.0.9 - Remote Keystroke Injection",
"x_generator": {
"engine": "vulncheck"
}
}
},
"cveMetadata": {
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"cveId": "CVE-2022-50925",
"datePublished": "2026-01-13T22:51:56.671Z",
"dateReserved": "2026-01-11T13:34:26.328Z",
"dateUpdated": "2026-01-13T22:51:56.671Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}