CVE-2024-0721: CWE-79 Cross Site Scripting in Jspxcms
A vulnerability has been found in Jspxcms 10.2.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Survey Label Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-251545 was assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2024-0721 is a Cross Site Scripting (XSS) vulnerability identified in version 10.2.0 of Jspxcms, specifically within an unspecified functionality of the Survey Label Handler component. This vulnerability allows an attacker to inject malicious scripts that execute in the context of a victim's browser session when interacting with the affected component. The vulnerability is remotely exploitable, requiring low attack complexity but does require the attacker to have some level of privileges (PR:L) and user interaction (UI:R) to trigger the exploit. The CVSS 3.1 base score is 3.5, indicating a low severity level. The impact primarily affects the integrity of the user interface by allowing script injection, but does not compromise confidentiality or availability. No public exploits are currently known to be in the wild, and no patches have been published yet. The vulnerability is classified under CWE-79, which is a common web application security issue related to improper input validation and output encoding in web applications. Given the nature of Jspxcms as a content management system, this vulnerability could be leveraged to conduct phishing attacks, session hijacking, or defacement by injecting malicious JavaScript code into survey labels that other users might view.
Potential Impact
For European organizations using Jspxcms 10.2.0, this vulnerability could lead to targeted attacks against users interacting with survey components on their websites. While the direct impact on confidentiality and availability is low, the integrity of user interactions and trust in the affected web applications could be compromised. This could result in reputational damage, especially for organizations in sectors such as education, government, or public services that rely on surveys for data collection and citizen engagement. Additionally, attackers could use the XSS vulnerability as a stepping stone for more sophisticated social engineering or session hijacking attacks, potentially leading to unauthorized actions or data manipulation. The requirement for some privilege and user interaction limits the scope but does not eliminate risk, particularly in environments where users have elevated roles or where social engineering can be effective.
Mitigation Recommendations
Organizations should immediately review their use of Jspxcms version 10.2.0 and specifically audit the Survey Label Handler component for untrusted input handling. Until an official patch is released, applying strict input validation and output encoding on all user-supplied data in survey labels is critical. Web Application Firewalls (WAFs) should be configured to detect and block common XSS payloads targeting survey-related endpoints. Additionally, implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting the sources from which scripts can be loaded. Organizations should also educate users about the risks of interacting with untrusted content and monitor logs for suspicious activities related to survey interactions. Finally, upgrading to a patched version of Jspxcms once available is essential to fully remediate the vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2024-0721: CWE-79 Cross Site Scripting in Jspxcms
Description
A vulnerability has been found in Jspxcms 10.2.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Survey Label Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-251545 was assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-0721 is a Cross Site Scripting (XSS) vulnerability identified in version 10.2.0 of Jspxcms, specifically within an unspecified functionality of the Survey Label Handler component. This vulnerability allows an attacker to inject malicious scripts that execute in the context of a victim's browser session when interacting with the affected component. The vulnerability is remotely exploitable, requiring low attack complexity but does require the attacker to have some level of privileges (PR:L) and user interaction (UI:R) to trigger the exploit. The CVSS 3.1 base score is 3.5, indicating a low severity level. The impact primarily affects the integrity of the user interface by allowing script injection, but does not compromise confidentiality or availability. No public exploits are currently known to be in the wild, and no patches have been published yet. The vulnerability is classified under CWE-79, which is a common web application security issue related to improper input validation and output encoding in web applications. Given the nature of Jspxcms as a content management system, this vulnerability could be leveraged to conduct phishing attacks, session hijacking, or defacement by injecting malicious JavaScript code into survey labels that other users might view.
Potential Impact
For European organizations using Jspxcms 10.2.0, this vulnerability could lead to targeted attacks against users interacting with survey components on their websites. While the direct impact on confidentiality and availability is low, the integrity of user interactions and trust in the affected web applications could be compromised. This could result in reputational damage, especially for organizations in sectors such as education, government, or public services that rely on surveys for data collection and citizen engagement. Additionally, attackers could use the XSS vulnerability as a stepping stone for more sophisticated social engineering or session hijacking attacks, potentially leading to unauthorized actions or data manipulation. The requirement for some privilege and user interaction limits the scope but does not eliminate risk, particularly in environments where users have elevated roles or where social engineering can be effective.
Mitigation Recommendations
Organizations should immediately review their use of Jspxcms version 10.2.0 and specifically audit the Survey Label Handler component for untrusted input handling. Until an official patch is released, applying strict input validation and output encoding on all user-supplied data in survey labels is critical. Web Application Firewalls (WAFs) should be configured to detect and block common XSS payloads targeting survey-related endpoints. Additionally, implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting the sources from which scripts can be loaded. Organizations should also educate users about the risks of interacting with untrusted content and monitor logs for suspicious activities related to survey interactions. Finally, upgrading to a patched version of Jspxcms once available is essential to fully remediate the vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-19T09:40:15.900Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f591b0bd07c3938ab02
Added to database: 6/10/2025, 6:54:17 PM
Last enriched: 7/11/2025, 12:03:52 AM
Last updated: 7/29/2025, 11:41:47 PM
Views: 13
Related Threats
CVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighCVE-2025-8451: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevteam Essential Addons for Elementor – Popular Elementor Templates & Widgets
MediumCVE-2025-8013: CWE-918 Server-Side Request Forgery (SSRF) in quttera Quttera Web Malware Scanner
LowCVE-2025-6679: CWE-434 Unrestricted Upload of File with Dangerous Type in bitpressadmin Bit Form – Custom Contact Form, Multi Step, Conversational, Payment & Quiz Form builder
CriticalCVE-2025-9013: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.