Insufficient Origin Validation in Proctorio Chrome Extension postMessage Handlers
Report #46b61f36-b685-4667-aebf-82a67ad69ad6 in Proctorio Private Bug Bounty Program
Disclosed Report
StatusClosed
TargetTier 1
Severity
Details
- Program
- Proctorio Private Bug Bounty Program
- Target
- Proctorio Google Chrome browser extension
- Creation Date
- 10/14/2025 4:10:05 PM
- Severity
- Low
- CVSS Score
- AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
- CVE Number
- CVE-2026-2345
- Visibility
- Disclosed
- Disclosed at
- 2/11/2026 3:12:55 PM
- Author
- @vcc3v
- Status
- Resolved (Closed)
- Vulnerability Type (CAPEC™)
- Cross-Site Scripting (XSS)
- Weakness (CWE)
- (CWE-346) Origin Validation Error
- Bonus
- € 750
Summary
The Proctorio Chrome Extension contains multiple window.addEventListener('message', ...) handlers that do not properly validate the origin of incoming messages. Specifically, an internal messaging bridge processes messages based solely on the presence of a fromWebsite property without verifying the event.origin attribute resulting in unauthorized interaction with extension functionality.
Description
The Proctorio Chrome Extension contained multiple instances of window.addEventListener('message', ...) handlers that did not validate the sender's origin. Specifically, a listener in the extension's internal messaging bridge accepted messages based solely on the presence of a fromWebsite property without verifying event.origin. This allowed a malicious webpage to use window.open() to open a page where the vulnerable script was injected and send crafted postMessage payloads to the extension's content script, which would then proxy those messages to the privileged background script.
Impact
The vulnerability allowed an attacker to send crafted postMessage payloads to the extension's background script from an external origin. However, the practical impact was significantly limited:
- The vulnerable code existed only on unpublished pages for an unreleased feature that was never publicly accessible or indexed by search engines
- Testing by both the researcher and Proctorio confirmed that no payload was identified that could disable security features, expose internal data, or manipulate exam state
- The exploit could not be executed against users during an active proctored exam
- No demonstrated path to bypassing pre-exam checks (such as ID verification or room scans) was confirmed
The finding represents a deviation from secure messaging best practices (missing origin validation), but no working exploit with security impact was demonstrated.
Timeline
Hackrate
Our platform helps companies to identify software vulnerabilities in a cost-efficient way. It provides a secure and centralized view of ethical hacking projects for your company.
US Patent Applied for HackGATE #63/645,845
Products
From the Blog
-
Press release: Hackrate becomes Hungary’s first CVE Numbering Authority
Jan 13 • 5 min read ★
-
Let 2026 be the year bug bounty becomes part of how you build and operate
Jan 05 • 4 min read
-
Ministry of Regional Development of the Czech Republic Launches Public Bug Bounty Program with Hackrate
Jul 16 • 2 min read ★
Hackrate Ethical Hacking Platform |
2026 ©
Numbering Authority