CVE-2022-50925
Unknown Unknown - Not Provided
Remote Keystroke Injection via WebSocket in Prowise Reflect

Publication date: 2026-01-13

Last updated on: 2026-01-13

Assigner: VulnCheck

Description
Prowise Reflect version 1.0.9 contains a remote keystroke injection vulnerability that allows attackers to send keyboard events through an exposed WebSocket on port 8082. Attackers can craft malicious web pages to inject keystrokes, opening applications and typing arbitrary text by sending specific WebSocket messages.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-13
Last Modified
2026-01-13
Generated
2026-05-07
AI Q&A
2026-01-14
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
prowise reflect 1.0.9
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-346 The product does not properly verify that the source of data or communication is valid.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can have a critical security impact by allowing remote attackers to execute arbitrary commands on the affected system through keystroke injection. Attackers can open applications, type commands, and input arbitrary text, potentially leading to unauthorized actions, data compromise, or system manipulation. Since the attack requires only user interaction and no privileges, it poses a significant risk to system confidentiality, integrity, and availability. [1, 2]


Can you explain this vulnerability to me?

This vulnerability in Prowise Reflect version 1.0.9 is a remote keystroke injection flaw. It allows attackers to send arbitrary keyboard events remotely by exploiting an exposed WebSocket service running on port 8082. Attackers can craft malicious web pages that open a WebSocket connection to the vulnerable application and inject keystrokes, which can open applications and type arbitrary text on the victim's system without requiring privileges or authentication, although user interaction is needed to trigger the attack. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking if the Prowise Reflect application version 1.0.9 is running and if port 8082 is exposed on the system. Network scanning tools like nmap can be used to check for open port 8082. For example, run: nmap -p 8082 <target-ip>. Additionally, monitoring WebSocket connections to ws://localhost:8082 or similar endpoints can indicate if the vulnerable service is active. Since the exploit uses WebSocket messages to inject keystrokes, inspecting WebSocket traffic on port 8082 may reveal suspicious activity. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1) Restrict network access to port 8082 to trusted hosts only or block it entirely if not needed. 2) Advise users to avoid visiting untrusted or suspicious web pages that could host malicious scripts exploiting this vulnerability. 3) Monitor and filter WebSocket traffic on port 8082 to detect or block unauthorized connections. 4) If possible, update or patch Prowise Reflect to a version that addresses this vulnerability once available. Until then, limiting exposure and user interaction are key to reducing risk. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart