Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-24724: n/a

0
Critical
VulnerabilityCVE-2024-24724cvecve-2024-24724
Published: Wed Apr 03 2024 (04/03/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Gibbon through 26.0.00 allows /modules/School%20Admin/messengerSettings.php Server Side Template Injection leading to Remote Code Execution because input is passed to the Twig template engine (messengerSettings.php) without sanitization.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:35:40 UTC

Technical Analysis

CVE-2024-24724 is a critical Server Side Template Injection (SSTI) vulnerability found in the Gibbon education management system, specifically affecting versions through 26.0.00. The vulnerability resides in the messengerSettings.php script located in the /modules/School Admin/ directory. The root cause is the unsanitized passing of user-controlled input to the Twig template engine, which is used to render templates server-side. Twig, when improperly handled, can allow attackers to inject malicious template code that the engine executes, resulting in Remote Code Execution (RCE). This means an attacker can run arbitrary commands on the server hosting the Gibbon application without any authentication or user interaction. The vulnerability is classified under CWE-1336 (Improper Neutralization of Input During Template Processing), highlighting the failure to sanitize inputs before template rendering. The CVSS v3.1 base score is 9.8, indicating a critical severity with network attack vector, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability’s characteristics make it highly exploitable. The lack of available patches at the time of publication necessitates immediate attention from administrators to implement workarounds or mitigations. Given Gibbon’s role in managing sensitive educational data and administrative functions, exploitation could lead to data breaches, system takeover, and disruption of educational services.

Potential Impact

The impact of CVE-2024-24724 is severe for organizations using the Gibbon platform, particularly educational institutions and school districts. Successful exploitation allows remote attackers to execute arbitrary code on the server, potentially leading to full system compromise. This can result in unauthorized access to sensitive student and staff data, manipulation or deletion of records, disruption of school administrative operations, and deployment of further malware or ransomware. The vulnerability’s ease of exploitation without authentication or user interaction increases the likelihood of automated attacks and widespread exploitation once public exploits emerge. Organizations may face regulatory and reputational damage due to data breaches and service outages. The critical nature of the vulnerability demands urgent remediation to prevent attackers from leveraging this flaw to gain persistent access or pivot within the network.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the /modules/School Admin/messengerSettings.php endpoint via network controls such as firewalls or web application firewalls (WAFs) to limit exposure. 2. Implement input validation and sanitization at the application layer to ensure that any data passed to the Twig template engine is properly escaped or filtered. 3. Monitor application logs for unusual requests targeting the messengerSettings.php script or attempts to inject template syntax. 4. If possible, disable or isolate the vulnerable module until an official patch is released by the Gibbon development team. 5. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect and block suspicious code execution attempts. 6. Keep the Gibbon platform and all dependencies up to date and subscribe to vendor security advisories for timely patch deployment. 7. Conduct a thorough security review of all template rendering code to identify and remediate similar injection risks. 8. Educate administrators and developers on secure template handling practices to prevent future SSTI vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d5eb7ef31ef0b570c05

Added to database: 2/25/2026, 9:45:02 PM

Last enriched: 2/28/2026, 9:35:40 AM

Last updated: 4/12/2026, 7:55:34 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses