CVE-2023-51843: n/a in n/a
react-dashboard 1.4.0 is vulnerable to Cross Site Scripting (XSS) as httpOnly is not set.
AI Analysis
Technical Summary
CVE-2023-51843 is a high-severity vulnerability affecting react-dashboard version 1.4.0, characterized as a Cross Site Scripting (XSS) flaw. The root cause is the failure to set the httpOnly flag on cookies, which is a security attribute that prevents client-side scripts from accessing cookie data. Without this flag, malicious scripts injected via XSS can read sensitive cookie information, such as session tokens, leading to session hijacking or user impersonation. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input leading to XSS attacks. The CVSS v3.1 score of 8.2 reflects a network attack vector with low attack complexity, no privileges required, but requiring user interaction (e.g., clicking a malicious link). The scope is changed, indicating that exploitation affects components beyond the initially vulnerable module. Confidentiality impact is high due to potential exposure of sensitive data, integrity impact is low, and availability impact is none. Although no known exploits are currently reported in the wild and no official patches are linked, the vulnerability poses a significant risk to applications using react-dashboard 1.4.0, especially those exposed to untrusted user input or external networks.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized access to user sessions, potentially exposing sensitive personal data protected under GDPR. Attackers exploiting this XSS flaw could impersonate users, perform unauthorized actions, or steal confidential information. This is particularly critical for sectors like finance, healthcare, and government services where react-dashboard might be used for internal or customer-facing dashboards. The compromise of session cookies could result in data breaches, reputational damage, regulatory fines, and loss of customer trust. Given the high CVSS score and the nature of the vulnerability, organizations with web applications incorporating react-dashboard 1.4.0 face a tangible risk of targeted attacks, especially if their applications accept user-generated content or inputs without sufficient sanitization.
Mitigation Recommendations
Organizations should immediately audit their use of react-dashboard and identify instances of version 1.4.0. If upgrading to a patched version is not yet possible due to the absence of an official patch, implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Additionally, ensure all user inputs are properly sanitized and encoded to prevent injection of malicious scripts. Set the httpOnly flag on all cookies to prevent client-side access. Employ Web Application Firewalls (WAFs) with rules targeting XSS patterns to detect and block exploitation attempts. Conduct thorough security testing, including automated and manual penetration tests focusing on XSS vectors. Educate developers on secure coding practices to avoid similar vulnerabilities in future releases. Monitor application logs for unusual activities indicative of exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-51843: n/a in n/a
Description
react-dashboard 1.4.0 is vulnerable to Cross Site Scripting (XSS) as httpOnly is not set.
AI-Powered Analysis
Technical Analysis
CVE-2023-51843 is a high-severity vulnerability affecting react-dashboard version 1.4.0, characterized as a Cross Site Scripting (XSS) flaw. The root cause is the failure to set the httpOnly flag on cookies, which is a security attribute that prevents client-side scripts from accessing cookie data. Without this flag, malicious scripts injected via XSS can read sensitive cookie information, such as session tokens, leading to session hijacking or user impersonation. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input leading to XSS attacks. The CVSS v3.1 score of 8.2 reflects a network attack vector with low attack complexity, no privileges required, but requiring user interaction (e.g., clicking a malicious link). The scope is changed, indicating that exploitation affects components beyond the initially vulnerable module. Confidentiality impact is high due to potential exposure of sensitive data, integrity impact is low, and availability impact is none. Although no known exploits are currently reported in the wild and no official patches are linked, the vulnerability poses a significant risk to applications using react-dashboard 1.4.0, especially those exposed to untrusted user input or external networks.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized access to user sessions, potentially exposing sensitive personal data protected under GDPR. Attackers exploiting this XSS flaw could impersonate users, perform unauthorized actions, or steal confidential information. This is particularly critical for sectors like finance, healthcare, and government services where react-dashboard might be used for internal or customer-facing dashboards. The compromise of session cookies could result in data breaches, reputational damage, regulatory fines, and loss of customer trust. Given the high CVSS score and the nature of the vulnerability, organizations with web applications incorporating react-dashboard 1.4.0 face a tangible risk of targeted attacks, especially if their applications accept user-generated content or inputs without sufficient sanitization.
Mitigation Recommendations
Organizations should immediately audit their use of react-dashboard and identify instances of version 1.4.0. If upgrading to a patched version is not yet possible due to the absence of an official patch, implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Additionally, ensure all user inputs are properly sanitized and encoded to prevent injection of malicious scripts. Set the httpOnly flag on all cookies to prevent client-side access. Employ Web Application Firewalls (WAFs) with rules targeting XSS patterns to detect and block exploitation attempts. Conduct thorough security testing, including automated and manual penetration tests focusing on XSS vectors. Educate developers on secure coding practices to avoid similar vulnerabilities in future releases. Monitor application logs for unusual activities indicative of exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-12-26T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683879c8182aa0cae2829662
Added to database: 5/29/2025, 3:14:16 PM
Last enriched: 7/8/2025, 1:11:56 AM
Last updated: 8/16/2025, 9:17:21 AM
Views: 15
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.