Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25293: n/a

0
Critical
VulnerabilityCVE-2024-25293cvecve-2024-25293
Published: Fri Mar 01 2024 (03/01/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

mjml-app versions 3.0.4 and 3.1.0-beta were discovered to contain a remote code execution (RCE) via the href attribute.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:33:51 UTC

Technical Analysis

CVE-2024-25293 is a critical remote code execution (RCE) vulnerability identified in mjml-app versions 3.0.4 and 3.1.0-beta. The vulnerability stems from unsafe processing of the href attribute, which can be manipulated by an attacker to execute arbitrary code on the affected system. This type of vulnerability is classified under CWE-94, indicating improper control of code injection or execution. The CVSS v3.1 score of 9.3 highlights the severity, with an attack vector classified as local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and scope changed (S:C), meaning the vulnerability can affect resources beyond the initially compromised component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), making it a critical threat. Although no public exploits have been reported yet, the vulnerability's characteristics suggest it could be exploited by attackers with local access to the system running the vulnerable mjml-app versions. The mjml-app is commonly used for rendering responsive email templates, so exploitation could lead to compromise of systems involved in email generation or processing. The lack of available patches at the time of publication necessitates immediate attention from users and administrators to implement interim mitigations and monitor for suspicious activity. The vulnerability's local attack vector implies that attackers need some level of access to the system, but no authentication or user interaction is required, increasing the risk of automated or insider attacks. The scope change indicates that exploitation could impact other components or systems beyond the mjml-app itself, potentially leading to broader system compromise.

Potential Impact

The impact of CVE-2024-25293 is severe for organizations using affected mjml-app versions, as it allows remote code execution without authentication or user interaction. Successful exploitation can lead to full system compromise, including unauthorized access to sensitive data, modification or destruction of data, and disruption of services. Given mjml-app's role in email template rendering, attackers could leverage this vulnerability to inject malicious payloads into email content or gain footholds within internal networks. This could facilitate further lateral movement, data exfiltration, or deployment of ransomware. The high CVSS score and scope change indicate that the vulnerability could affect multiple components or systems, amplifying the potential damage. Organizations with critical email infrastructure or those relying on mjml-app for automated email generation are particularly at risk. The lack of known exploits in the wild currently reduces immediate threat but does not diminish the urgency for remediation, as threat actors may develop exploits rapidly. The vulnerability also poses risks to supply chain security if mjml-app is integrated into larger software products or services.

Mitigation Recommendations

1. Immediately audit all systems to identify instances of mjml-app versions 3.0.4 and 3.1.0-beta in use. 2. Restrict local access to systems running vulnerable mjml-app versions to trusted personnel only, minimizing the attack surface. 3. Implement application-level input validation and sanitization for href attributes to prevent malicious code injection. 4. Monitor system logs and network traffic for unusual activity indicative of exploitation attempts, such as unexpected code execution or process spawning. 5. Employ host-based intrusion detection systems (HIDS) to detect anomalous behavior on affected hosts. 6. Segregate vulnerable systems within network segments with strict access controls to limit potential lateral movement. 7. Coordinate with mjml-app maintainers or vendors for timely patch releases and apply updates as soon as they become available. 8. Consider temporary disabling or replacing mjml-app functionality if feasible until patches are deployed. 9. Educate developers and administrators about secure coding practices related to URL handling and code injection prevention. 10. Conduct penetration testing focused on href attribute exploitation to validate the effectiveness of mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d63b7ef31ef0b571c32

Added to database: 2/25/2026, 9:45:07 PM

Last enriched: 2/26/2026, 10:33:51 AM

Last updated: 4/12/2026, 7:51:29 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses