Skip to main content

CVE-2023-51843: n/a in n/a

High
VulnerabilityCVE-2023-51843cvecve-2023-51843
Published: Tue Jan 30 2024 (01/30/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

react-dashboard 1.4.0 is vulnerable to Cross Site Scripting (XSS) as httpOnly is not set.

AI-Powered Analysis

AILast updated: 07/08/2025, 01:11:56 UTC

Technical Analysis

CVE-2023-51843 is a high-severity vulnerability affecting react-dashboard version 1.4.0, characterized as a Cross Site Scripting (XSS) flaw. The root cause is the failure to set the httpOnly flag on cookies, which is a security attribute that prevents client-side scripts from accessing cookie data. Without this flag, malicious scripts injected via XSS can read sensitive cookie information, such as session tokens, leading to session hijacking or user impersonation. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input leading to XSS attacks. The CVSS v3.1 score of 8.2 reflects a network attack vector with low attack complexity, no privileges required, but requiring user interaction (e.g., clicking a malicious link). The scope is changed, indicating that exploitation affects components beyond the initially vulnerable module. Confidentiality impact is high due to potential exposure of sensitive data, integrity impact is low, and availability impact is none. Although no known exploits are currently reported in the wild and no official patches are linked, the vulnerability poses a significant risk to applications using react-dashboard 1.4.0, especially those exposed to untrusted user input or external networks.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized access to user sessions, potentially exposing sensitive personal data protected under GDPR. Attackers exploiting this XSS flaw could impersonate users, perform unauthorized actions, or steal confidential information. This is particularly critical for sectors like finance, healthcare, and government services where react-dashboard might be used for internal or customer-facing dashboards. The compromise of session cookies could result in data breaches, reputational damage, regulatory fines, and loss of customer trust. Given the high CVSS score and the nature of the vulnerability, organizations with web applications incorporating react-dashboard 1.4.0 face a tangible risk of targeted attacks, especially if their applications accept user-generated content or inputs without sufficient sanitization.

Mitigation Recommendations

Organizations should immediately audit their use of react-dashboard and identify instances of version 1.4.0. If upgrading to a patched version is not yet possible due to the absence of an official patch, implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Additionally, ensure all user inputs are properly sanitized and encoded to prevent injection of malicious scripts. Set the httpOnly flag on all cookies to prevent client-side access. Employ Web Application Firewalls (WAFs) with rules targeting XSS patterns to detect and block exploitation attempts. Conduct thorough security testing, including automated and manual penetration tests focusing on XSS vectors. Educate developers on secure coding practices to avoid similar vulnerabilities in future releases. Monitor application logs for unusual activities indicative of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-12-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683879c8182aa0cae2829662

Added to database: 5/29/2025, 3:14:16 PM

Last enriched: 7/8/2025, 1:11:56 AM

Last updated: 8/16/2025, 9:17:21 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats