CVE-2024-24160: n/a in n/a
MRCMS 3.0 contains a Cross-Site Scripting (XSS) vulnerability via /admin/system/saveinfo.do.
AI Analysis
Technical Summary
CVE-2024-24160 is a Cross-Site Scripting (XSS) vulnerability identified in MRCMS version 3.0, specifically exploitable via the /admin/system/saveinfo.do endpoint. Cross-Site Scripting vulnerabilities arise when an application includes untrusted user input in web pages without proper validation or escaping, allowing attackers to inject malicious scripts. In this case, the vulnerability is reflected in an administrative interface, which suggests that the endpoint processes input that can be manipulated to execute arbitrary JavaScript code in the context of an authenticated administrator's browser session. The CVSS 3.1 base score is 6.1 (medium severity), with the vector indicating that the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), does not require privileges (PR:N), but does require user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. The impact affects confidentiality and integrity to a limited degree (C:L/I:L), but does not affect availability (A:N). The CWE classification is CWE-79, which is the standard identifier for XSS vulnerabilities. No patches or known exploits in the wild are currently reported. The vulnerability's exploitation could allow an attacker to execute scripts that steal session tokens, perform actions on behalf of the administrator, or manipulate the CMS settings, potentially leading to further compromise.
Potential Impact
For European organizations using MRCMS 3.0, this vulnerability poses a moderate risk, especially if the affected CMS is used to manage critical web content or administrative functions. Successful exploitation could lead to unauthorized actions performed with administrator privileges, data leakage, or manipulation of website content. This could damage organizational reputation, lead to data breaches involving personal or sensitive information protected under GDPR, and disrupt business operations. Since the vulnerability requires user interaction and targets administrative interfaces, the risk is higher in environments where administrators access the CMS from less secure networks or devices. The scope change indicates that the impact could extend beyond the immediate vulnerable component, potentially affecting other integrated systems or services. European organizations with public-facing CMS installations or those managing sensitive data should be particularly vigilant.
Mitigation Recommendations
Organizations should immediately review and restrict access to the /admin/system/saveinfo.do endpoint, ensuring it is only accessible by trusted administrators over secure networks (e.g., via VPN or IP whitelisting). Implement strict input validation and output encoding on all user-supplied data within the CMS, especially in administrative modules. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting script execution sources. Regularly update and patch the CMS once a vendor-provided fix becomes available. In the interim, monitor administrative access logs for suspicious activity and educate administrators about the risks of interacting with untrusted content or links. Additionally, consider deploying Web Application Firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting the vulnerable endpoint. Conduct security audits and penetration testing focused on the CMS to identify and remediate similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2024-24160: n/a in n/a
Description
MRCMS 3.0 contains a Cross-Site Scripting (XSS) vulnerability via /admin/system/saveinfo.do.
AI-Powered Analysis
Technical Analysis
CVE-2024-24160 is a Cross-Site Scripting (XSS) vulnerability identified in MRCMS version 3.0, specifically exploitable via the /admin/system/saveinfo.do endpoint. Cross-Site Scripting vulnerabilities arise when an application includes untrusted user input in web pages without proper validation or escaping, allowing attackers to inject malicious scripts. In this case, the vulnerability is reflected in an administrative interface, which suggests that the endpoint processes input that can be manipulated to execute arbitrary JavaScript code in the context of an authenticated administrator's browser session. The CVSS 3.1 base score is 6.1 (medium severity), with the vector indicating that the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), does not require privileges (PR:N), but does require user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. The impact affects confidentiality and integrity to a limited degree (C:L/I:L), but does not affect availability (A:N). The CWE classification is CWE-79, which is the standard identifier for XSS vulnerabilities. No patches or known exploits in the wild are currently reported. The vulnerability's exploitation could allow an attacker to execute scripts that steal session tokens, perform actions on behalf of the administrator, or manipulate the CMS settings, potentially leading to further compromise.
Potential Impact
For European organizations using MRCMS 3.0, this vulnerability poses a moderate risk, especially if the affected CMS is used to manage critical web content or administrative functions. Successful exploitation could lead to unauthorized actions performed with administrator privileges, data leakage, or manipulation of website content. This could damage organizational reputation, lead to data breaches involving personal or sensitive information protected under GDPR, and disrupt business operations. Since the vulnerability requires user interaction and targets administrative interfaces, the risk is higher in environments where administrators access the CMS from less secure networks or devices. The scope change indicates that the impact could extend beyond the immediate vulnerable component, potentially affecting other integrated systems or services. European organizations with public-facing CMS installations or those managing sensitive data should be particularly vigilant.
Mitigation Recommendations
Organizations should immediately review and restrict access to the /admin/system/saveinfo.do endpoint, ensuring it is only accessible by trusted administrators over secure networks (e.g., via VPN or IP whitelisting). Implement strict input validation and output encoding on all user-supplied data within the CMS, especially in administrative modules. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting script execution sources. Regularly update and patch the CMS once a vendor-provided fix becomes available. In the interim, monitor administrative access logs for suspicious activity and educate administrators about the risks of interacting with untrusted content or links. Additionally, consider deploying Web Application Firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting the vulnerable endpoint. Conduct security audits and penetration testing focused on the CMS to identify and remediate similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-01-25T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd768a
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/5/2025, 1:11:56 AM
Last updated: 8/17/2025, 2:13:50 PM
Views: 14
Related Threats
CVE-2025-9108: Improper Restriction of Rendered UI Layers in Portabilis i-Diario
MediumCVE-2025-9107: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9106: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9105: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9104: Cross Site Scripting in Portabilis i-Diario
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.