CVE-2026-2345
Awaiting Analysis Awaiting Analysis - Queue
Improper Origin Validation in Proctorio Chrome Extension Enables Message Spoofing

Publication date: 2026-02-11

Last updated on: 2026-02-11

Assigner: 7004884b-51e2-48e8-b4a2-5ca29e80453e

Description
Proctorio Chrome Extension is a browser extension used for online proctoring. The extension contains multiple window.addEventListener('message', ...) handlers that do not properly validate the origin of incoming messages. Specifically, an internal messaging bridge processes messages based solely on the presence of a fromWebsite property without verifying the event.origin attribute.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-11
Last Modified
2026-02-11
Generated
2026-05-07
AI Q&A
2026-02-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
proctorio chrome_extension *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-346 The product does not properly verify that the source of data or communication is valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "The CVE-2026-2345 vulnerability is an origin validation error in the Proctorio Chrome Extension's message handling. The extension uses multiple window.addEventListener('message', ...) handlers that process incoming messages based only on the presence of a fromWebsite property, without verifying the event.origin attribute. This flaw allows a malicious webpage to open a new window, inject a script, and send crafted postMessage payloads to the extension’s content script, which then forwards them to privileged background scripts. This is classified as a Cross-Site Scripting (XSS) issue with CWE-346 (Origin Validation Error)."}, {'type': 'paragraph', 'content': 'However, the vulnerability had limited impact because the vulnerable code existed only on unpublished pages for an unreleased feature, which were not publicly accessible or indexed. Testing showed no payload could disable security features, expose internal data, or manipulate exam states. The exploit could not be executed during active proctored exams, and no bypass of pre-exam checks was demonstrated.'}] [1]


How can this vulnerability impact me? :

The impact of this vulnerability is limited due to several mitigating factors. It requires local access, high attack complexity, and user interaction. The vulnerable code was only present on unpublished, unreleased feature pages that were not publicly accessible. No successful exploit was demonstrated that could disable security features, expose internal data, or manipulate exam states. Additionally, the vulnerability could not be exploited during active proctored exams or bypass pre-exam verification checks.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability involves improper origin validation in the Proctorio Chrome extension's message event handlers. Detection would require inspecting the extension's internal scripts to verify if the event.origin attribute is properly checked before processing messages."}, {'type': 'paragraph', 'content': "Since the vulnerability is within the extension's internal code and involves JavaScript event listeners, network detection is limited. However, you can check the installed version of the Proctorio Chrome extension and verify if it is the patched version released after October 27, 2025."}, {'type': 'paragraph', 'content': 'There are no specific network commands or signatures provided to detect exploitation attempts.'}, {'type': 'paragraph', 'content': "For manual inspection, you could use Chrome Developer Tools to review the extension's background and content scripts for the presence of window.addEventListener('message', ...) handlers that do not validate event.origin."}] [1]


What immediate steps should I take to mitigate this vulnerability?

The vulnerability was fixed by Proctorio by deploying a patch that validates the origin of incoming messages before processing them.

  • Ensure that the Proctorio Chrome extension is updated to the latest version released after October 27, 2025.
  • Advise users to avoid installing or using unofficial or outdated versions of the extension.
  • Since exploitation requires local access and user interaction, maintain good security hygiene such as restricting local access and educating users about phishing or malicious websites.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart