CVE-2024-24160: n/a in n/a
MRCMS 3.0 contains a Cross-Site Scripting (XSS) vulnerability via /admin/system/saveinfo.do.
AI Analysis
Technical Summary
CVE-2024-24160 is a Cross-Site Scripting (XSS) vulnerability identified in MRCMS version 3.0, specifically exploitable via the /admin/system/saveinfo.do endpoint. Cross-Site Scripting vulnerabilities arise when an application includes untrusted user input in web pages without proper validation or escaping, allowing attackers to inject malicious scripts. In this case, the vulnerability is reflected in an administrative interface, which suggests that the endpoint processes input that can be manipulated to execute arbitrary JavaScript code in the context of an authenticated administrator's browser session. The CVSS 3.1 base score is 6.1 (medium severity), with the vector indicating that the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), does not require privileges (PR:N), but does require user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. The impact affects confidentiality and integrity to a limited degree (C:L/I:L), but does not affect availability (A:N). The CWE classification is CWE-79, which is the standard identifier for XSS vulnerabilities. No patches or known exploits in the wild are currently reported. The vulnerability's exploitation could allow an attacker to execute scripts that steal session tokens, perform actions on behalf of the administrator, or manipulate the CMS settings, potentially leading to further compromise.
Potential Impact
For European organizations using MRCMS 3.0, this vulnerability poses a moderate risk, especially if the affected CMS is used to manage critical web content or administrative functions. Successful exploitation could lead to unauthorized actions performed with administrator privileges, data leakage, or manipulation of website content. This could damage organizational reputation, lead to data breaches involving personal or sensitive information protected under GDPR, and disrupt business operations. Since the vulnerability requires user interaction and targets administrative interfaces, the risk is higher in environments where administrators access the CMS from less secure networks or devices. The scope change indicates that the impact could extend beyond the immediate vulnerable component, potentially affecting other integrated systems or services. European organizations with public-facing CMS installations or those managing sensitive data should be particularly vigilant.
Mitigation Recommendations
Organizations should immediately review and restrict access to the /admin/system/saveinfo.do endpoint, ensuring it is only accessible by trusted administrators over secure networks (e.g., via VPN or IP whitelisting). Implement strict input validation and output encoding on all user-supplied data within the CMS, especially in administrative modules. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting script execution sources. Regularly update and patch the CMS once a vendor-provided fix becomes available. In the interim, monitor administrative access logs for suspicious activity and educate administrators about the risks of interacting with untrusted content or links. Additionally, consider deploying Web Application Firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting the vulnerable endpoint. Conduct security audits and penetration testing focused on the CMS to identify and remediate similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2024-24160: n/a in n/a
Description
MRCMS 3.0 contains a Cross-Site Scripting (XSS) vulnerability via /admin/system/saveinfo.do.
AI-Powered Analysis
Technical Analysis
CVE-2024-24160 is a Cross-Site Scripting (XSS) vulnerability identified in MRCMS version 3.0, specifically exploitable via the /admin/system/saveinfo.do endpoint. Cross-Site Scripting vulnerabilities arise when an application includes untrusted user input in web pages without proper validation or escaping, allowing attackers to inject malicious scripts. In this case, the vulnerability is reflected in an administrative interface, which suggests that the endpoint processes input that can be manipulated to execute arbitrary JavaScript code in the context of an authenticated administrator's browser session. The CVSS 3.1 base score is 6.1 (medium severity), with the vector indicating that the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), does not require privileges (PR:N), but does require user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. The impact affects confidentiality and integrity to a limited degree (C:L/I:L), but does not affect availability (A:N). The CWE classification is CWE-79, which is the standard identifier for XSS vulnerabilities. No patches or known exploits in the wild are currently reported. The vulnerability's exploitation could allow an attacker to execute scripts that steal session tokens, perform actions on behalf of the administrator, or manipulate the CMS settings, potentially leading to further compromise.
Potential Impact
For European organizations using MRCMS 3.0, this vulnerability poses a moderate risk, especially if the affected CMS is used to manage critical web content or administrative functions. Successful exploitation could lead to unauthorized actions performed with administrator privileges, data leakage, or manipulation of website content. This could damage organizational reputation, lead to data breaches involving personal or sensitive information protected under GDPR, and disrupt business operations. Since the vulnerability requires user interaction and targets administrative interfaces, the risk is higher in environments where administrators access the CMS from less secure networks or devices. The scope change indicates that the impact could extend beyond the immediate vulnerable component, potentially affecting other integrated systems or services. European organizations with public-facing CMS installations or those managing sensitive data should be particularly vigilant.
Mitigation Recommendations
Organizations should immediately review and restrict access to the /admin/system/saveinfo.do endpoint, ensuring it is only accessible by trusted administrators over secure networks (e.g., via VPN or IP whitelisting). Implement strict input validation and output encoding on all user-supplied data within the CMS, especially in administrative modules. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting script execution sources. Regularly update and patch the CMS once a vendor-provided fix becomes available. In the interim, monitor administrative access logs for suspicious activity and educate administrators about the risks of interacting with untrusted content or links. Additionally, consider deploying Web Application Firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting the vulnerable endpoint. Conduct security audits and penetration testing focused on the CMS to identify and remediate similar vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-01-25T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd768a
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/5/2025, 1:11:56 AM
Last updated: 1/19/2026, 12:02:14 PM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1152: Unrestricted Upload in technical-laohu mpay
MediumCVE-2026-1151: Cross Site Scripting in technical-laohu mpay
MediumCVE-2026-1150: Command Injection in Totolink LR350
Medium42,000 Impacted by Ingram Micro Ransomware Attack
MediumCVE-2026-1149: Command Injection in Totolink LR350
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.