Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-27752: n/a

0
Medium
VulnerabilityCVE-2024-27752cvecve-2024-27752
Published: Fri Apr 19 2024 (04/19/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross Site Scripting vulnerability in CSZ CMS v.1.3.0 allows a remote attacker to execute arbitrary code via the Default Keyword field in the settings function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 11:13:24 UTC

Technical Analysis

CVE-2024-27752 is a medium severity Cross Site Scripting (XSS) vulnerability identified in CSZ CMS version 1.3.0. The vulnerability arises from insufficient sanitization of user input in the Default Keyword field within the settings function, allowing a remote attacker to inject malicious scripts. Exploitation requires the attacker to have limited privileges (PR:L) and user interaction (UI:R), such as an authenticated user accessing the settings page and inputting crafted data. The vulnerability impacts confidentiality and integrity by enabling script execution in the context of the victim's browser, potentially leading to session hijacking, data theft, or unauthorized actions within the CMS. The CVSS vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) indicates network attack vector, low attack complexity, and scope change, meaning the vulnerability affects resources beyond the initially vulnerable component. No patches or known exploits are currently available, emphasizing the need for proactive mitigation. The vulnerability is classified under CWE-79, a common category for XSS flaws, highlighting the importance of proper input validation and output encoding in web applications. Given the CMS's role in managing website content, exploitation could compromise site integrity and user trust.

Potential Impact

The primary impact of CVE-2024-27752 is the potential for attackers to execute arbitrary scripts in the browsers of users with access to the CMS settings, leading to confidentiality and integrity breaches. This could result in session hijacking, unauthorized changes to CMS configurations, or theft of sensitive information. Although availability is not directly impacted, the compromise of CMS settings could indirectly disrupt website operations or content delivery. Organizations relying on CSZ CMS 1.3.0 face risks of reputational damage, data leakage, and potential regulatory non-compliance if user data is exposed. The requirement for limited privileges and user interaction reduces the ease of exploitation but does not eliminate risk, especially in environments with many users or weak access controls. The scope change indicates that the vulnerability could affect components beyond the immediate settings function, potentially amplifying the impact. Without available patches, the window of exposure remains open, increasing the urgency for mitigation.

Mitigation Recommendations

1. Immediately restrict access to the settings function in CSZ CMS to only highly trusted administrators to reduce the attack surface. 2. Implement strict input validation and output encoding on the Default Keyword field to neutralize any injected scripts, using context-appropriate encoding (e.g., HTML entity encoding). 3. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the CMS interface. 4. Monitor CMS logs for unusual activity or attempts to inject scripts via the Default Keyword field. 5. Educate administrators and users with access to the settings about the risks of clicking on suspicious links or entering untrusted data. 6. Regularly check for vendor updates or patches addressing this vulnerability and apply them promptly once available. 7. Consider deploying web application firewalls (WAF) with rules targeting XSS payloads specific to this CMS. 8. Conduct security audits and penetration testing focused on input handling in the CMS to identify and remediate similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d87b7ef31ef0b587e37

Added to database: 2/25/2026, 9:45:43 PM

Last enriched: 2/26/2026, 11:13:24 AM

Last updated: 4/12/2026, 1:57:07 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses