Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-50925

CVE-2022-50925: Prowise Reflect RCE Vulnerability

CVE-2022-50925 is a remote code execution flaw in Prowise Reflect v1.0.9 that enables keystroke injection via WebSocket on port 8082. Attackers can execute arbitrary commands remotely. This article covers technical details, impact, and mitigation.

Updated: January 22, 2026

CVE-2022-50925 Overview

CVE-2022-50925 is a remote keystroke injection vulnerability affecting Prowise Reflect version 1.0.9. The vulnerability exists due to an exposed WebSocket service on port 8082 that lacks proper origin validation, allowing attackers to send keyboard events remotely. By crafting malicious web pages, attackers can inject keystrokes to open applications and type arbitrary text through specific WebSocket messages.

Critical Impact

Remote attackers can inject arbitrary keystrokes into affected systems, potentially leading to arbitrary command execution, data exfiltration, or complete system compromise through automated keystroke sequences.

Affected Products

  • Prowise Reflect version 1.0.9
  • Systems running Prowise Reflect with WebSocket service exposed on port 8082
  • Environments where users may browse malicious web pages while Prowise Reflect is active

Discovery Timeline

  • 2026-01-13 - CVE CVE-2022-50925 published to NVD
  • 2026-01-13 - Last updated in NVD database

Technical Details for CVE-2022-50925

Vulnerability Analysis

This vulnerability is classified under CWE-346 (Origin Validation Error), indicating that the Prowise Reflect WebSocket service fails to properly validate the origin of incoming connections. The WebSocket endpoint on port 8082 accepts keyboard event messages from any origin, including malicious websites visited by users on the same network or local machine.

The attack requires user interaction, specifically visiting a malicious web page while the vulnerable Prowise Reflect application is running. Once the victim visits the attacker-controlled page, JavaScript code can establish a WebSocket connection to the exposed service and begin sending keystroke commands.

Root Cause

The root cause of CVE-2022-50925 is the absence of proper origin validation on the WebSocket service. Prowise Reflect exposes a WebSocket interface on port 8082 intended for legitimate keyboard input handling, but fails to implement Cross-Origin Resource Sharing (CORS) restrictions or WebSocket origin checks. This allows any web page to connect to the service and inject keystroke events as if they were legitimate user input.

Attack Vector

The attack vector is network-based and requires user interaction. An attacker must first lure a victim to a malicious web page while Prowise Reflect is running. The malicious page then establishes a WebSocket connection to localhost:8082 or the victim's IP address on port 8082. Once connected, the attacker can send specially crafted WebSocket messages containing keyboard event data, effectively typing arbitrary keystrokes on the victim's system.

This attack can be leveraged to open terminal applications, execute system commands, manipulate open documents, or perform any action achievable through keyboard input. The VulnCheck Security Advisory provides additional technical details on exploitation methods.

Detection Methods for CVE-2022-50925

Indicators of Compromise

  • Unexpected WebSocket connections to port 8082 from browser processes
  • Anomalous keyboard activity or command execution without user interaction
  • Network traffic containing WebSocket upgrade requests to port 8082 originating from web browsers
  • Automated typing or rapid keystroke patterns in applications

Detection Strategies

  • Monitor for WebSocket connections on port 8082 from non-authorized processes or remote origins
  • Implement network monitoring rules to detect unusual traffic patterns to Prowise Reflect services
  • Deploy endpoint detection to identify browser-initiated connections to local WebSocket services
  • Audit process behavior for signs of automated keystroke injection following web browsing activity

Monitoring Recommendations

  • Enable detailed logging for Prowise Reflect WebSocket connections including origin information
  • Configure network intrusion detection systems to alert on WebSocket traffic to port 8082
  • Implement browser isolation or sandboxing to limit access to local services from web content
  • Deploy SentinelOne Singularity to detect and respond to suspicious keystroke injection patterns and unauthorized process behavior

How to Mitigate CVE-2022-50925

Immediate Actions Required

  • Restrict network access to port 8082 using host-based firewall rules
  • Consider disabling Prowise Reflect until a patched version is available
  • Implement network segmentation to limit exposure of the WebSocket service
  • Educate users about the risks of visiting untrusted websites while running Prowise Reflect

Patch Information

No official patch information is currently available from the vendor. Organizations should monitor the Prowise official website for security updates and consult the Exploit-DB entry #50796 for technical details on the vulnerability.

Workarounds

  • Block inbound and outbound traffic to port 8082 at the firewall level to prevent exploitation
  • Disable or remove Prowise Reflect from systems where it is not required for business operations
  • Implement browser security policies that prevent WebSocket connections to localhost services
  • Use browser extensions or security tools that block cross-origin WebSocket connections to local addresses
bash
# Configuration example - Block WebSocket port using iptables
# Block incoming connections to port 8082
iptables -A INPUT -p tcp --dport 8082 -j DROP

# Block outgoing connections to port 8082 (defense in depth)
iptables -A OUTPUT -p tcp --dport 8082 -j DROP

# Windows Firewall alternative
# netsh advfirewall firewall add rule name="Block Prowise WebSocket" dir=in action=block protocol=tcp localport=8082

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechProwise Reflect

  • SeverityHIGH

  • CVSS Score8.6

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-346
  • Technical References
  • Exploit-DB #50796

  • Prowise Company Website

  • VulnCheck Security Advisory
  • Latest CVEs
  • CVE-2025-49454: TinySalt Path Traversal Vulnerability

  • CVE-2025-48261: MultiVendorX Information Disclosure Flaw

  • CVE-2025-32119: CardGate WooCommerce SQL Injection Flaw

  • CVE-2025-26879: s2Member Plugin Reflected XSS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English