CVE-2024-0599: CWE-79 Cross Site Scripting in Jspxcms
A vulnerability was found in Jspxcms 10.2.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file src\main\java\com\jspxcms\core\web\back\InfoController.java of the component Document Management Page. The manipulation of the argument title leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250837 was assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2024-0599 is a Cross Site Scripting (XSS) vulnerability identified in Jspxcms version 10.2.0, specifically within the Document Management Page component. The vulnerability arises from improper handling of the 'title' argument in the InfoController.java file, allowing an attacker to inject malicious scripts. This flaw is classified under CWE-79, which pertains to improper neutralization of input during web page generation, leading to script injection. The vulnerability can be exploited remotely, requiring low attack complexity but does require some level of privileges (PR:L) and user interaction (UI:R). The CVSS v3.1 base score is 3.5, indicating a low severity level primarily due to limited impact on confidentiality and availability, with integrity impact being low. The vulnerability does not require authentication to be exploited but does require user interaction, such as a victim clicking a crafted link or visiting a malicious page. No public exploits are currently known in the wild, but the vulnerability details have been disclosed publicly, increasing the risk of exploitation. The lack of an official patch link suggests that remediation may require manual mitigation or awaiting an official update from the vendor. Given the nature of XSS, successful exploitation could allow attackers to execute arbitrary scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or redirection to malicious sites, but it does not directly compromise server confidentiality or availability.
Potential Impact
For European organizations using Jspxcms 10.2.0, this vulnerability poses a risk primarily to web application users and administrators. The impact is mostly on the integrity of the user experience and trustworthiness of the affected web portals. Attackers could exploit this XSS flaw to conduct phishing attacks, steal session cookies, or perform actions on behalf of authenticated users, potentially leading to unauthorized access or data manipulation within the application context. While the direct impact on backend systems or sensitive data confidentiality is limited, the reputational damage and potential regulatory implications under GDPR for failing to protect user data and prevent malicious script execution could be significant. Organizations operating public-facing websites or intranet portals with Jspxcms are at risk of targeted attacks exploiting this vulnerability, especially if user interaction can be engineered via social engineering or phishing campaigns. The low CVSS score reflects limited direct damage but does not diminish the importance of addressing the vulnerability to maintain user trust and compliance with European data protection standards.
Mitigation Recommendations
1. Immediate mitigation should include input validation and output encoding on the 'title' parameter within the InfoController.java to neutralize any injected scripts. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 3. Implement web application firewalls (WAF) with rules to detect and block common XSS payloads targeting the affected endpoint. 4. Educate users and administrators about the risks of clicking on suspicious links or interacting with untrusted content. 5. Monitor web server logs for unusual requests or patterns indicative of attempted exploitation. 6. Coordinate with the Jspxcms vendor or community to obtain or develop an official patch and apply it promptly once available. 7. Conduct regular security assessments and penetration testing focused on XSS vulnerabilities to identify and remediate similar issues proactively. 8. Review and harden authentication and session management mechanisms to minimize the impact of potential session hijacking.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2024-0599: CWE-79 Cross Site Scripting in Jspxcms
Description
A vulnerability was found in Jspxcms 10.2.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file src\main\java\com\jspxcms\core\web\back\InfoController.java of the component Document Management Page. The manipulation of the argument title leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250837 was assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-0599 is a Cross Site Scripting (XSS) vulnerability identified in Jspxcms version 10.2.0, specifically within the Document Management Page component. The vulnerability arises from improper handling of the 'title' argument in the InfoController.java file, allowing an attacker to inject malicious scripts. This flaw is classified under CWE-79, which pertains to improper neutralization of input during web page generation, leading to script injection. The vulnerability can be exploited remotely, requiring low attack complexity but does require some level of privileges (PR:L) and user interaction (UI:R). The CVSS v3.1 base score is 3.5, indicating a low severity level primarily due to limited impact on confidentiality and availability, with integrity impact being low. The vulnerability does not require authentication to be exploited but does require user interaction, such as a victim clicking a crafted link or visiting a malicious page. No public exploits are currently known in the wild, but the vulnerability details have been disclosed publicly, increasing the risk of exploitation. The lack of an official patch link suggests that remediation may require manual mitigation or awaiting an official update from the vendor. Given the nature of XSS, successful exploitation could allow attackers to execute arbitrary scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or redirection to malicious sites, but it does not directly compromise server confidentiality or availability.
Potential Impact
For European organizations using Jspxcms 10.2.0, this vulnerability poses a risk primarily to web application users and administrators. The impact is mostly on the integrity of the user experience and trustworthiness of the affected web portals. Attackers could exploit this XSS flaw to conduct phishing attacks, steal session cookies, or perform actions on behalf of authenticated users, potentially leading to unauthorized access or data manipulation within the application context. While the direct impact on backend systems or sensitive data confidentiality is limited, the reputational damage and potential regulatory implications under GDPR for failing to protect user data and prevent malicious script execution could be significant. Organizations operating public-facing websites or intranet portals with Jspxcms are at risk of targeted attacks exploiting this vulnerability, especially if user interaction can be engineered via social engineering or phishing campaigns. The low CVSS score reflects limited direct damage but does not diminish the importance of addressing the vulnerability to maintain user trust and compliance with European data protection standards.
Mitigation Recommendations
1. Immediate mitigation should include input validation and output encoding on the 'title' parameter within the InfoController.java to neutralize any injected scripts. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 3. Implement web application firewalls (WAF) with rules to detect and block common XSS payloads targeting the affected endpoint. 4. Educate users and administrators about the risks of clicking on suspicious links or interacting with untrusted content. 5. Monitor web server logs for unusual requests or patterns indicative of attempted exploitation. 6. Coordinate with the Jspxcms vendor or community to obtain or develop an official patch and apply it promptly once available. 7. Conduct regular security assessments and penetration testing focused on XSS vulnerabilities to identify and remediate similar issues proactively. 8. Review and harden authentication and session management mechanisms to minimize the impact of potential session hijacking.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-16T15:15:15.436Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd7896
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/5/2025, 1:57:51 AM
Last updated: 8/14/2025, 10:36:30 PM
Views: 18
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.