Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-27609: n/a

0
Medium
VulnerabilityCVE-2024-27609cvecve-2024-27609
Published: Sun Mar 31 2024 (03/31/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Bonita before 2023.2-u2 allows stored XSS via a UI screen in the administration panel.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:12:10 UTC

Technical Analysis

CVE-2024-27609 is a stored cross-site scripting (XSS) vulnerability identified in Bonita BPM software versions before 2023.2-u2. The vulnerability resides in a user interface screen within the administration panel, where malicious input can be injected and persistently stored. When an administrator accesses the affected UI screen, the injected script executes in their browser context. This type of vulnerability falls under CWE-79, which concerns improper neutralization of input leading to script injection. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L) indicates that the attack can be performed remotely over the network without any privileges or user interaction, with low attack complexity. The impact primarily affects confidentiality by potentially exposing sensitive information accessible to the administrator's session and availability by causing disruptions through script execution. However, integrity impact is not indicated. No known public exploits have been reported yet, but the vulnerability's presence in an administrative interface makes it a valuable target for attackers seeking to compromise management functions. The lack of authentication requirement for exploitation suggests that the vulnerable interface might be accessible without login or that the vulnerability can be triggered in contexts where authentication is not enforced. The absence of patch links in the provided data suggests that users should verify with Bonita's official channels for updates or mitigations. Given the nature of stored XSS, attackers could use this vector to perform session hijacking, defacement, or deliver further payloads targeting administrative users.

Potential Impact

The vulnerability poses a moderate risk to organizations using affected Bonita BPM versions. Exploitation could allow attackers to execute arbitrary scripts in the context of administrative users, potentially leading to session hijacking, theft of sensitive information, or disruption of administrative operations. Although the integrity impact is not directly affected, confidentiality and availability impacts are present but limited. Since the vulnerability affects the administration panel, successful attacks could compromise management controls, leading to broader security implications if attackers leverage the foothold for further attacks. Organizations with exposed or poorly secured Bonita administrative interfaces are at higher risk. The lack of known exploits reduces immediate threat but does not eliminate future risk. The medium severity rating reflects the balance between ease of exploitation and limited impact scope. However, organizations with critical BPM workflows relying on Bonita should treat this vulnerability seriously to avoid potential operational disruptions or data exposure.

Mitigation Recommendations

To mitigate CVE-2024-27609, organizations should immediately upgrade Bonita BPM to version 2023.2-u2 or later, where the vulnerability is addressed. If upgrading is not immediately feasible, implement strict input validation and sanitization on all user inputs in the administration panel to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. Limit access to the administration panel by network segmentation, firewall rules, and strong authentication mechanisms to reduce exposure. Monitor logs for suspicious input patterns or unusual administrative interface activity. Conduct regular security assessments and penetration testing focusing on the administration UI to detect similar vulnerabilities. Educate administrators about the risks of XSS and encourage cautious behavior when interacting with UI elements. Finally, stay updated with Bonita's security advisories for any patches or additional mitigation guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d82b7ef31ef0b580aaa

Added to database: 2/25/2026, 9:45:38 PM

Last enriched: 2/28/2026, 10:12:10 AM

Last updated: 4/12/2026, 2:00:56 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses