Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25297: n/a

0
Medium
VulnerabilityCVE-2024-25297cvecve-2024-25297
Published: Sat Feb 17 2024 (02/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-25297 is a Cross Site Scripting (XSS) vulnerability found in Bludit CMS version 3. 15, specifically in the edit-content. php component. This vulnerability allows remote attackers with high privileges and requiring user interaction to execute arbitrary code and potentially access sensitive information. The vulnerability has a CVSS score of 4. 8, indicating a medium severity level. Exploitation requires authentication and user interaction, limiting its ease of exploitation. There are no known exploits in the wild currently, and no patches have been published yet. The vulnerability impacts the confidentiality and integrity of affected systems but does not affect availability. Organizations using Bludit CMS should prioritize remediation once patches are available and implement strict input validation and content security policies to mitigate risks in the meantime.

AI-Powered Analysis

AILast updated: 02/26/2026, 10:34:26 UTC

Technical Analysis

CVE-2024-25297 is a Cross Site Scripting (XSS) vulnerability identified in Bludit CMS version 3.15, located in the edit-content.php file. XSS vulnerabilities occur when an application includes untrusted data in a web page without proper validation or escaping, allowing attackers to inject malicious scripts. In this case, remote attackers with authenticated access and requiring user interaction can exploit this flaw to execute arbitrary JavaScript code within the context of the victim's browser session. This can lead to unauthorized access to sensitive information such as session tokens, cookies, or other private data, and potentially allow further attacks like session hijacking or privilege escalation. The vulnerability has a CVSS 3.1 base score of 4.8, reflecting medium severity due to the need for authentication (PR:H) and user interaction (UI:R), but with network attack vector (AV:N) and low attack complexity (AC:L). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Although no known exploits are currently reported in the wild and no official patches have been released, the presence of this vulnerability in a content management system used for website content management poses a risk to organizations relying on Bludit CMS for their web presence. The CWE-79 classification confirms this is a classic reflected or stored XSS issue, emphasizing the need for proper input sanitization and output encoding in the affected component.

Potential Impact

The impact of CVE-2024-25297 primarily affects the confidentiality and integrity of web applications running Bludit CMS version 3.15. Successful exploitation allows attackers to execute arbitrary scripts in the context of authenticated users, potentially leading to theft of session cookies, user impersonation, and unauthorized access to sensitive data. This can undermine user trust and lead to data breaches or further compromise of the web application. While availability is not directly impacted, the indirect consequences of data leakage or privilege escalation can disrupt business operations. Organizations with public-facing websites using Bludit CMS are at risk, especially if administrative users are targeted. The requirement for authentication and user interaction reduces the likelihood of widespread automated exploitation but does not eliminate targeted attacks, particularly in environments with less stringent access controls or where social engineering can be leveraged.

Mitigation Recommendations

To mitigate CVE-2024-25297, organizations should first monitor for official patches or updates from Bludit CMS and apply them promptly once available. In the interim, implement strict input validation and output encoding on all user-supplied content, especially in the edit-content.php component, to prevent injection of malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Limit user privileges to the minimum necessary to reduce the attack surface, ensuring that only trusted users have access to content editing features. Conduct regular security audits and penetration testing focused on XSS vulnerabilities. Additionally, educate users about the risks of interacting with suspicious links or content to reduce the effectiveness of social engineering attempts. Consider deploying Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting Bludit CMS endpoints.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d63b7ef31ef0b571c3a

Added to database: 2/25/2026, 9:45:07 PM

Last enriched: 2/26/2026, 10:34:26 AM

Last updated: 2/26/2026, 11:16:03 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats