CVE-2024-24160: n/a in n/a
MRCMS 3.0 contains a Cross-Site Scripting (XSS) vulnerability via /admin/system/saveinfo.do.
AI Analysis
Technical Summary
CVE-2024-24160 is a Cross-Site Scripting (XSS) vulnerability identified in MRCMS version 3.0, specifically exploitable via the /admin/system/saveinfo.do endpoint. Cross-Site Scripting vulnerabilities arise when an application includes untrusted user input in web pages without proper validation or escaping, allowing attackers to inject malicious scripts. In this case, the vulnerability is reflected in an administrative interface, which suggests that the endpoint processes input that can be manipulated to execute arbitrary JavaScript code in the context of an authenticated administrator's browser session. The CVSS 3.1 base score is 6.1 (medium severity), with the vector indicating that the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), does not require privileges (PR:N), but does require user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. The impact affects confidentiality and integrity to a limited degree (C:L/I:L), but does not affect availability (A:N). The CWE classification is CWE-79, which is the standard identifier for XSS vulnerabilities. No patches or known exploits in the wild are currently reported. The vulnerability's exploitation could allow an attacker to execute scripts that steal session tokens, perform actions on behalf of the administrator, or manipulate the CMS settings, potentially leading to further compromise.
Potential Impact
For European organizations using MRCMS 3.0, this vulnerability poses a moderate risk, especially if the affected CMS is used to manage critical web content or administrative functions. Successful exploitation could lead to unauthorized actions performed with administrator privileges, data leakage, or manipulation of website content. This could damage organizational reputation, lead to data breaches involving personal or sensitive information protected under GDPR, and disrupt business operations. Since the vulnerability requires user interaction and targets administrative interfaces, the risk is higher in environments where administrators access the CMS from less secure networks or devices. The scope change indicates that the impact could extend beyond the immediate vulnerable component, potentially affecting other integrated systems or services. European organizations with public-facing CMS installations or those managing sensitive data should be particularly vigilant.
Mitigation Recommendations
Organizations should immediately review and restrict access to the /admin/system/saveinfo.do endpoint, ensuring it is only accessible by trusted administrators over secure networks (e.g., via VPN or IP whitelisting). Implement strict input validation and output encoding on all user-supplied data within the CMS, especially in administrative modules. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting script execution sources. Regularly update and patch the CMS once a vendor-provided fix becomes available. In the interim, monitor administrative access logs for suspicious activity and educate administrators about the risks of interacting with untrusted content or links. Additionally, consider deploying Web Application Firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting the vulnerable endpoint. Conduct security audits and penetration testing focused on the CMS to identify and remediate similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2024-24160: n/a in n/a
Description
MRCMS 3.0 contains a Cross-Site Scripting (XSS) vulnerability via /admin/system/saveinfo.do.
AI-Powered Analysis
Technical Analysis
CVE-2024-24160 is a Cross-Site Scripting (XSS) vulnerability identified in MRCMS version 3.0, specifically exploitable via the /admin/system/saveinfo.do endpoint. Cross-Site Scripting vulnerabilities arise when an application includes untrusted user input in web pages without proper validation or escaping, allowing attackers to inject malicious scripts. In this case, the vulnerability is reflected in an administrative interface, which suggests that the endpoint processes input that can be manipulated to execute arbitrary JavaScript code in the context of an authenticated administrator's browser session. The CVSS 3.1 base score is 6.1 (medium severity), with the vector indicating that the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), does not require privileges (PR:N), but does require user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. The impact affects confidentiality and integrity to a limited degree (C:L/I:L), but does not affect availability (A:N). The CWE classification is CWE-79, which is the standard identifier for XSS vulnerabilities. No patches or known exploits in the wild are currently reported. The vulnerability's exploitation could allow an attacker to execute scripts that steal session tokens, perform actions on behalf of the administrator, or manipulate the CMS settings, potentially leading to further compromise.
Potential Impact
For European organizations using MRCMS 3.0, this vulnerability poses a moderate risk, especially if the affected CMS is used to manage critical web content or administrative functions. Successful exploitation could lead to unauthorized actions performed with administrator privileges, data leakage, or manipulation of website content. This could damage organizational reputation, lead to data breaches involving personal or sensitive information protected under GDPR, and disrupt business operations. Since the vulnerability requires user interaction and targets administrative interfaces, the risk is higher in environments where administrators access the CMS from less secure networks or devices. The scope change indicates that the impact could extend beyond the immediate vulnerable component, potentially affecting other integrated systems or services. European organizations with public-facing CMS installations or those managing sensitive data should be particularly vigilant.
Mitigation Recommendations
Organizations should immediately review and restrict access to the /admin/system/saveinfo.do endpoint, ensuring it is only accessible by trusted administrators over secure networks (e.g., via VPN or IP whitelisting). Implement strict input validation and output encoding on all user-supplied data within the CMS, especially in administrative modules. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting script execution sources. Regularly update and patch the CMS once a vendor-provided fix becomes available. In the interim, monitor administrative access logs for suspicious activity and educate administrators about the risks of interacting with untrusted content or links. Additionally, consider deploying Web Application Firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting the vulnerable endpoint. Conduct security audits and penetration testing focused on the CMS to identify and remediate similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-01-25T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd768a
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/5/2025, 1:11:56 AM
Last updated: 12/5/2025, 2:07:41 AM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62223: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2025-14052: Improper Access Controls in youlaitech youlai-mall
MediumCVE-2025-13373: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Advantech iView
HighCVE-2025-66564: CWE-405: Asymmetric Resource Consumption (Amplification) in sigstore timestamp-authority
HighCVE-2025-66559: CWE-129: Improper Validation of Array Index in taikoxyz taiko-mono
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.