Security for everyone

CVE-2022-44946 Scanner

Detects 'Cross Site Scripting' vulnerability in Rukovoditel affects v. <= 3.2.1


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2022-44946 Scanner Detail

Rukovoditel is a comprehensive project management system that serves as an efficient tool for managing tasks, projects, and customer relationships within organizations. This software is employed across various industries due to its flexibility, user-friendly interface, and customizable features. It enables teams to collaborate effectively, streamline project workflows, and enhance productivity. The application's broad functionality ranges from simple task management to complex project planning and CRM, making it suitable for businesses of all sizes. Rukovoditel's web-based nature allows for easy access from anywhere, fostering improved communication and project visibility.

The stored Cross-Site Scripting (XSS) vulnerability identified in Rukovoditel version 3.2.1 and below poses a significant security risk. It occurs within the Add Page functionality, where malicious scripts can be injected into the Title field. Such scripts execute within the browser of any user viewing the infected page, potentially leading to data breaches, session hijacking, and other security compromises. This vulnerability underscores the importance of validating and sanitizing user inputs to prevent malicious content from compromising the application's security.

Specifically, this XSS vulnerability is located in the Add Page feature accessible via /index.php?module=help_pages/pages&entities_id=24. Attackers can exploit this by crafting a payload that, when inserted into the Title field and saved, results in the execution of malicious JavaScript code on the user's browser. This flaw requires authenticated access to exploit, indicating that even users with legitimate credentials can inadvertently or maliciously introduce harmful scripts. The lack of sufficient input sanitization and output encoding mechanisms in Rukovoditel allows such vulnerabilities to exist and be exploited.

The exploitation of this XSS vulnerability could have several detrimental effects, including theft of sensitive information such as cookies and session tokens, impersonation of legitimate users, manipulation of web page content, and redirection to malicious sites. These actions can compromise not only the security of the affected application but also the privacy and integrity of user data. It highlights the critical need for robust security practices in web applications to protect against such vulnerabilities.

Joining the SecurityForEveryone platform provides users with access to advanced security scanning technologies that identify vulnerabilities like the XSS flaw in Rukovoditel. Our platform offers comprehensive scans, real-time alerts, and actionable insights, enabling organizations to proactively address security weaknesses. Members benefit from our expertise in cyber threat exposure management, ensuring that their digital assets are safeguarded against emerging threats. With SecurityForEveryone, you can enhance your security posture, protect sensitive data, and maintain the trust of your clients and users.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture