Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11831: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

0
Medium
VulnerabilityCVE-2024-11831cvecve-2024-11831
Published: Mon Feb 10 2025 (02/10/2025, 15:27:46 UTC)
Source: CVE

Description

A flaw was found in npm-serialize-javascript. The vulnerability occurs because the serialize-javascript module does not properly sanitize certain inputs, such as regex or other JavaScript object types, allowing an attacker to inject malicious code. This code could be executed when deserialized by a web browser, causing Cross-site scripting (XSS) attacks. This issue is critical in environments where serialized data is sent to web clients, potentially compromising the security of the website or web application using this package.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/02/2026, 02:06:12 UTC

Technical Analysis

CVE-2024-11831 is a cross-site scripting vulnerability in the npm serialize-javascript module version 6.0. The module fails to properly sanitize certain inputs, including regex and other JavaScript object types, enabling attackers to inject malicious code. This code can execute in the context of a web browser when the serialized data is deserialized, potentially compromising the security of web applications using this package. The vulnerability has a CVSS 3.1 base score of 5.4 (medium severity) with network attack vector, low attack complexity, requiring low privileges and user interaction, and impacts confidentiality and integrity with no availability impact. Red Hat advisories reference this CVE but do not explicitly confirm a fix or patch for this specific vulnerability. The advisories primarily address .NET 8.0 security updates unrelated to serialize-javascript. No known exploits have been reported.

Potential Impact

The vulnerability allows an attacker to inject and execute malicious JavaScript code in a victim's browser via improperly sanitized serialized data. This can lead to cross-site scripting attacks, potentially exposing sensitive information or enabling further attacks within the context of the affected web application. The CVSS score indicates a medium severity impact on confidentiality and integrity, with no impact on availability. No known active exploitation has been reported.

Mitigation Recommendations

Patch status for CVE-2024-11831 is not confirmed in the provided vendor advisory content. Users should check the official vendor or package repository for updates or patches addressing this vulnerability. Until a patch is available, avoid using vulnerable versions of serialize-javascript (version 6.0) in environments where serialized data is sent to web clients. Implement input validation and output encoding as additional protective measures against XSS. Monitor vendor advisories for official remediation guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-11-26T18:56:38.187Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED
Vendor Advisory Urls
[{"url":"https://access.redhat.com/errata/RHBA-2025:0304","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:0381","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:10853","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:1334","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:1468","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:21068","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:21203","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:3870","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:4511","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:8059","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:8078","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:8233","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:8479","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:8512","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:8544","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:8551","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:9294","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2026:1536","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2026:2769","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2026:8568","vendor":"Red Hat"},{"url":"https://access.redhat.com/security/cve/CVE-2024-11831","vendor":"Red Hat"}]

Threat ID: 682d68e7d4f2164cc924150d

Added to database: 5/21/2025, 5:47:19 AM

Last enriched: 5/2/2026, 2:06:12 AM

Last updated: 5/8/2026, 12:12:47 PM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses