CVE-2022-31190: XMLUI's metadata of withdrawn Items is exposed to anonymous users
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.27773%
CWE
Published
8/6/2022
Updated
7/24/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.dspace:dspace-xmlui | maven | >= 4.0, <= 6.3 | 6.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing authorization checks in XMLUI metadata generators. The commit diff shows both DSpaceMETSGenerator and DSpaceOREGenerator's generate() methods were modified to add isAuthorized() checks and return 403 responses. Prior to this fix, these methods would render metadata without verifying READ permissions, allowing anonymous access to withdrawn items' metadata through their respective endpoints (mets.xml/ore.xml). The high confidence comes from direct evidence in the patch showing security checks were added to these specific generator entry points.