Insufficient Origin Validation in Proctorio Chrome Extension postMessage Handlers


Report #46b61f36-b685-4667-aebf-82a67ad69ad6 in Proctorio Private Bug Bounty Program

Disclosed Report
StatusClosed
Resolved
TargetTier 1
Proctorio Google Chrome browser extension
Severity
Low
Details
Program
Proctorio Private Bug Bounty Program
Target
Proctorio Google Chrome browser extension
Creation Date
10/14/2025 4:10:05 PM
Severity
Low
CVSS Score
AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
CVE Number
CVE-2026-2345
Visibility
Disclosed
Disclosed at
2/11/2026 3:12:55 PM
Author
@vcc3v
Status
Resolved (Closed)
Vulnerability Type (CAPEC™)
Cross-Site Scripting (XSS)
Weakness (CWE)
(CWE-346) Origin Validation Error
Bonus
€ 750
Summary

The Proctorio Chrome Extension contains multiple window.addEventListener('message', ...) handlers that do not properly validate the origin of incoming messages. Specifically, an internal messaging bridge processes messages based solely on the presence of a fromWebsite property without verifying the event.origin attribute resulting in unauthorized interaction with extension functionality.

Description

The Proctorio Chrome Extension contained multiple instances of window.addEventListener('message', ...) handlers that did not validate the sender's origin. Specifically, a listener in the extension's internal messaging bridge accepted messages based solely on the presence of a fromWebsite property without verifying event.origin. This allowed a malicious webpage to use window.open() to open a page where the vulnerable script was injected and send crafted postMessage payloads to the extension's content script, which would then proxy those messages to the privileged background script.

Impact

The vulnerability allowed an attacker to send crafted postMessage payloads to the extension's background script from an external origin. However, the practical impact was significantly limited:

  • The vulnerable code existed only on unpublished pages for an unreleased feature that was never publicly accessible or indexed by search engines
  • Testing by both the researcher and Proctorio confirmed that no payload was identified that could disable security features, expose internal data, or manipulate exam state
  • The exploit could not be executed against users during an active proctored exam
  • No demonstrated path to bypassing pre-exam checks (such as ID verification or room scans) was confirmed

The finding represents a deviation from secure messaging best practices (missing origin validation), but no working exploit with security impact was demonstrated.

Timeline
vcc3v

Created.

Tuesday, October 14, 2025 4:10 PM
Tyrell

Changed to Accepted (Open)

Thursday, October 16, 2025 9:31 AM
Miiike

The work items related to this have been created. The good news is this code runs on a page only published in March and isn't wired up or used yet because it is still going through testing. We have checked, and it's not referenced in any documentation or indexed by google yet.

However, you are correct, using the window.open and then sending javascript into that window you can trigger the background command bridge. This will be addressed immediately. This unfortunately works today because the page in question (up until July 2025) used a CSP rule that blocked this, however we had eliminated the CSP from this domain because of how others integrate into it.

Although there isn't specific commands that would disable security settings, you could absolutely attempt to corrupt the exam process and maybe through the right sequence cause the extension to behave in a way unintended and crash while in an exam.

I will update this ticket as we progress on work items.

Saturday, October 18, 2025 1:56 AM
ana3

Severity changed from High to Low

Monday, October 27, 2025 10:50 PM
Tyrell

Changed to Resolved (Closed).Hi! The remediation was deployed, if you can bypass the fix, please let us know.

Saturday, January 10, 2026 1:05 PM
Hackrate

Our platform helps companies to identify software vulnerabilities in a cost-efficient way. It provides a secure and centralized view of ethical hacking projects for your company.

US Patent Applied for HackGATE #63/645,845

Checking service status...

Capterra G2 Rating

Hackrate Ethical Hacking Platform |
2026 ©

CVE Numbering Authority