Skip to main content

CVE-2024-24160: n/a in n/a

Medium
VulnerabilityCVE-2024-24160cvecve-2024-24160
Published: Fri Feb 02 2024 (02/02/2024, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

MRCMS 3.0 contains a Cross-Site Scripting (XSS) vulnerability via /admin/system/saveinfo.do.

AI-Powered Analysis

AILast updated: 07/05/2025, 01:11:56 UTC

Technical Analysis

CVE-2024-24160 is a Cross-Site Scripting (XSS) vulnerability identified in MRCMS version 3.0, specifically exploitable via the /admin/system/saveinfo.do endpoint. Cross-Site Scripting vulnerabilities arise when an application includes untrusted user input in web pages without proper validation or escaping, allowing attackers to inject malicious scripts. In this case, the vulnerability is reflected in an administrative interface, which suggests that the endpoint processes input that can be manipulated to execute arbitrary JavaScript code in the context of an authenticated administrator's browser session. The CVSS 3.1 base score is 6.1 (medium severity), with the vector indicating that the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), does not require privileges (PR:N), but does require user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. The impact affects confidentiality and integrity to a limited degree (C:L/I:L), but does not affect availability (A:N). The CWE classification is CWE-79, which is the standard identifier for XSS vulnerabilities. No patches or known exploits in the wild are currently reported. The vulnerability's exploitation could allow an attacker to execute scripts that steal session tokens, perform actions on behalf of the administrator, or manipulate the CMS settings, potentially leading to further compromise.

Potential Impact

For European organizations using MRCMS 3.0, this vulnerability poses a moderate risk, especially if the affected CMS is used to manage critical web content or administrative functions. Successful exploitation could lead to unauthorized actions performed with administrator privileges, data leakage, or manipulation of website content. This could damage organizational reputation, lead to data breaches involving personal or sensitive information protected under GDPR, and disrupt business operations. Since the vulnerability requires user interaction and targets administrative interfaces, the risk is higher in environments where administrators access the CMS from less secure networks or devices. The scope change indicates that the impact could extend beyond the immediate vulnerable component, potentially affecting other integrated systems or services. European organizations with public-facing CMS installations or those managing sensitive data should be particularly vigilant.

Mitigation Recommendations

Organizations should immediately review and restrict access to the /admin/system/saveinfo.do endpoint, ensuring it is only accessible by trusted administrators over secure networks (e.g., via VPN or IP whitelisting). Implement strict input validation and output encoding on all user-supplied data within the CMS, especially in administrative modules. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting script execution sources. Regularly update and patch the CMS once a vendor-provided fix becomes available. In the interim, monitor administrative access logs for suspicious activity and educate administrators about the risks of interacting with untrusted content or links. Additionally, consider deploying Web Application Firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting the vulnerable endpoint. Conduct security audits and penetration testing focused on the CMS to identify and remediate similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-25T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd768a

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 1:11:56 AM

Last updated: 8/17/2025, 2:13:50 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats