Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25327: n/a

0
Medium
VulnerabilityCVE-2024-25327cvecve-2024-25327
Published: Thu Mar 07 2024 (03/07/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross Site Scripting (XSS) vulnerability in Justice Systems FullCourt Enterprise v.8.2 allows a remote attacker to execute arbitrary code via the formatCaseNumber parameter of the Citation search function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:42:43 UTC

Technical Analysis

CVE-2024-25327 is a Cross Site Scripting (XSS) vulnerability identified in the Justice Systems FullCourt Enterprise software, version 8.2. This vulnerability arises from improper sanitization or validation of the formatCaseNumber parameter within the Citation search function, allowing an attacker to inject malicious scripts. When a victim interacts with a crafted URL or input containing malicious code in this parameter, the script executes in the context of the victim's browser. This can lead to unauthorized actions such as session hijacking, theft of sensitive information, or manipulation of the web application's interface. The vulnerability does not require the attacker to have any privileges or authentication, but it does require user interaction to trigger the exploit. The CVSS 3.1 base score of 6.1 reflects a medium severity, with attack vector being network (remote), low attack complexity, no privileges required, but user interaction necessary. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the vulnerable component, potentially impacting confidentiality and integrity but not availability. No patches or fixes have been released at the time of publication, and no active exploits have been reported. This vulnerability is classified under CWE-79, a common weakness for XSS issues, which are prevalent in web applications that fail to properly encode or sanitize user inputs.

Potential Impact

The primary impact of this vulnerability is on the confidentiality and integrity of data handled by the Justice Systems FullCourt Enterprise platform. Successful exploitation could allow attackers to execute arbitrary JavaScript in the context of authenticated users, potentially leading to session hijacking, unauthorized data access, or manipulation of case information. This could undermine the trustworthiness and security of judicial case management systems, which often handle sensitive legal data. While availability is not directly affected, the indirect consequences of data leakage or unauthorized actions could disrupt judicial processes. Organizations worldwide that rely on this software for case management, especially courts and legal institutions, face risks of data breaches and reputational damage. The requirement for user interaction limits the ease of exploitation but does not eliminate the threat, particularly in environments where users may be targeted with phishing or social engineering attacks. The absence of known exploits in the wild reduces immediate risk but does not preclude future attacks once exploit code becomes available.

Mitigation Recommendations

Given the lack of an official patch, organizations should implement several specific mitigations: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the formatCaseNumber parameter. 2) Conduct input validation and output encoding on all user-supplied data, especially parameters used in search functions, to prevent script injection. 3) Educate users, particularly court staff, about the risks of clicking on suspicious links or inputs that could trigger XSS attacks. 4) Monitor logs and network traffic for unusual activity related to the Citation search function. 5) If possible, restrict access to the vulnerable functionality to trusted networks or users until a patch is available. 6) Engage with the vendor or software provider to obtain updates or workarounds. 7) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. These targeted actions go beyond generic advice and focus on the specific vulnerable parameter and context.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d65b7ef31ef0b571c9f

Added to database: 2/25/2026, 9:45:09 PM

Last enriched: 2/28/2026, 9:42:43 AM

Last updated: 4/12/2026, 7:54:57 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses