Skip to main content

CVE-2024-0721: CWE-79 Cross Site Scripting in Jspxcms

Low
VulnerabilityCVE-2024-0721cvecve-2024-0721cwe-79
Published: Fri Jan 19 2024 (01/19/2024, 16:00:07 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: Jspxcms

Description

A vulnerability has been found in Jspxcms 10.2.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Survey Label Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-251545 was assigned to this vulnerability.

AI-Powered Analysis

AILast updated: 07/11/2025, 00:03:52 UTC

Technical Analysis

CVE-2024-0721 is a Cross Site Scripting (XSS) vulnerability identified in version 10.2.0 of Jspxcms, specifically within an unspecified functionality of the Survey Label Handler component. This vulnerability allows an attacker to inject malicious scripts that execute in the context of a victim's browser session when interacting with the affected component. The vulnerability is remotely exploitable, requiring low attack complexity but does require the attacker to have some level of privileges (PR:L) and user interaction (UI:R) to trigger the exploit. The CVSS 3.1 base score is 3.5, indicating a low severity level. The impact primarily affects the integrity of the user interface by allowing script injection, but does not compromise confidentiality or availability. No public exploits are currently known to be in the wild, and no patches have been published yet. The vulnerability is classified under CWE-79, which is a common web application security issue related to improper input validation and output encoding in web applications. Given the nature of Jspxcms as a content management system, this vulnerability could be leveraged to conduct phishing attacks, session hijacking, or defacement by injecting malicious JavaScript code into survey labels that other users might view.

Potential Impact

For European organizations using Jspxcms 10.2.0, this vulnerability could lead to targeted attacks against users interacting with survey components on their websites. While the direct impact on confidentiality and availability is low, the integrity of user interactions and trust in the affected web applications could be compromised. This could result in reputational damage, especially for organizations in sectors such as education, government, or public services that rely on surveys for data collection and citizen engagement. Additionally, attackers could use the XSS vulnerability as a stepping stone for more sophisticated social engineering or session hijacking attacks, potentially leading to unauthorized actions or data manipulation. The requirement for some privilege and user interaction limits the scope but does not eliminate risk, particularly in environments where users have elevated roles or where social engineering can be effective.

Mitigation Recommendations

Organizations should immediately review their use of Jspxcms version 10.2.0 and specifically audit the Survey Label Handler component for untrusted input handling. Until an official patch is released, applying strict input validation and output encoding on all user-supplied data in survey labels is critical. Web Application Firewalls (WAFs) should be configured to detect and block common XSS payloads targeting survey-related endpoints. Additionally, implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting the sources from which scripts can be loaded. Organizations should also educate users about the risks of interacting with untrusted content and monitor logs for suspicious activities related to survey interactions. Finally, upgrading to a patched version of Jspxcms once available is essential to fully remediate the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-19T09:40:15.900Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f591b0bd07c3938ab02

Added to database: 6/10/2025, 6:54:17 PM

Last enriched: 7/11/2025, 12:03:52 AM

Last updated: 7/29/2025, 11:41:47 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats