Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23190: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Open-Xchange GmbH OX App Suite

0
Medium
VulnerabilityCVE-2024-23190cvecve-2024-23190
Published: Mon Apr 08 2024 (04/08/2024, 08:09:12 UTC)
Source: CVE Database V5
Vendor/Project: Open-Xchange GmbH
Product: OX App Suite

Description

Upsell shop information of an account can be manipulated to execute script code in the context of the users browser session. To exploit this an attacker would require temporary access to a users account or an successful social engineering attack to lure users to maliciously configured accounts. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. Sanitization of user-defined upsell content has been improved. No publicly available exploits are known.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:42:37 UTC

Technical Analysis

CVE-2024-23190 is a cross-site scripting (XSS) vulnerability identified in the OX App Suite by Open-Xchange GmbH. The flaw stems from improper neutralization of input during web page generation, specifically in the upsell shop information associated with user accounts. This allows an attacker to inject and execute arbitrary JavaScript code within the victim's browser session. To exploit this vulnerability, an attacker must first gain temporary access to a user's account or successfully manipulate users via social engineering to interact with maliciously crafted upsell content. Once exploited, the attacker can perform unauthorized API requests on behalf of the user or extract sensitive information from the user's account, compromising confidentiality and integrity. The vulnerability does not impact system availability. The CVSS v3.1 base score is 5.4 (medium), reflecting network attack vector, low attack complexity, required privileges, and user interaction. The vulnerability has a scope change, indicating potential impact beyond the vulnerable component. The vendor has addressed the issue by improving sanitization of user-defined upsell content and has released patches. No known public exploits exist at this time, but the risk remains significant due to the potential for targeted social engineering and account compromise.

Potential Impact

For European organizations using OX App Suite, this vulnerability poses a risk to user data confidentiality and integrity. Attackers exploiting this flaw could hijack user sessions to perform unauthorized actions or extract sensitive information, potentially leading to data breaches or unauthorized access to organizational resources. Given that exploitation requires account access or social engineering, organizations with weaker access controls or less user security awareness are at higher risk. The vulnerability could be leveraged in targeted attacks against high-value users or administrators, amplifying potential damage. While availability is not affected, the breach of confidentiality and integrity could undermine trust in communication and collaboration platforms, disrupt business operations, and lead to regulatory compliance issues under GDPR if personal data is compromised.

Mitigation Recommendations

European organizations should immediately apply the vendor-provided patches to OX App Suite to remediate the vulnerability. Beyond patching, organizations should enforce strong authentication mechanisms, such as multi-factor authentication, to reduce the risk of account compromise. User training to recognize social engineering attempts is critical to prevent attackers from luring users to malicious content. Monitoring and logging user activities for unusual API requests or account behavior can help detect exploitation attempts early. Additionally, organizations should review and restrict permissions related to upsell content management to minimize attack surface. Implementing Content Security Policy (CSP) headers can provide an additional layer of defense against XSS by restricting script execution contexts. Regular security assessments and penetration testing focused on web application inputs can help identify similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
OX
Date Reserved
2024-01-12T07:03:12.862Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a474d6d939959c80223ec

Added to database: 11/4/2025, 6:34:53 PM

Last enriched: 11/4/2025, 9:42:37 PM

Last updated: 11/5/2025, 10:47:38 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats