{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-50925","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2026-01-11T13:34:26.328Z","datePublished":"2026-01-13T22:51:56.671Z","dateUpdated":"2026-04-07T14:06:41.170Z"},"containers":{"cna":{"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-04-07T14:06:41.170Z"},"title":"Prowise Reflect v1.0.9 - Remote Keystroke Injection","descriptions":[{"lang":"en","value":"Prowise Reflect version 1.0.9 contains a remote keystroke injection vulnerability that allows attackers to send keyboard events through an exposed WebSocket on port 8082. Attackers can craft malicious web pages to inject keystrokes, opening applications and typing arbitrary text by sending specific WebSocket messages."}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Origin Validation Error","cweId":"CWE-346","type":"CWE"}]}],"affected":[{"vendor":"Prowise","product":"Prowise Reflect","versions":[{"version":"V1.0.9","status":"affected"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":8.6,"baseSeverity":"HIGH","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"ACTIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS"},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS"}],"references":[{"url":"https://www.exploit-db.com/exploits/50796","name":"ExploitDB-50796","tags":["exploit"]},{"url":"https://www.prowise.com/","name":"Prowise Official Homepage","tags":["product"]},{"name":"VulnCheck Advisory: Prowise Reflect v1.0.9 - Remote Keystroke Injection","tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/prowise-reflect-remote-keystroke-injection"}],"credits":[{"lang":"en","value":"Rik Lutz","type":"finder"}],"x_generator":{"engine":"vulncheck"},"datePublic":"2022-03-02T00:00:00.000Z"},"adp":[{"references":[{"url":"https://www.exploit-db.com/exploits/50796","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-14T15:50:21.662128Z","id":"CVE-2022-50925","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-14T19:19:41.593Z"}}]}}