Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28740: n/a

0
Medium
VulnerabilityCVE-2024-28740cvecve-2024-28740
Published: Tue Aug 06 2024 (08/06/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross Site Scripting vulnerability in Koha ILS 23.05 and before allows a remote attacker to execute arbitrary code via the additonal-contents.pl component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:28:24 UTC

Technical Analysis

CVE-2024-28740 identifies a Cross Site Scripting (XSS) vulnerability in the Koha Integrated Library System (ILS), specifically in the additonal-contents.pl component. Koha is an open-source library management software widely used by libraries globally to manage cataloging, circulation, and patron services. This vulnerability allows a remote attacker to inject malicious scripts that execute in the context of a victim's browser when they interact with the vulnerable component. The CVSS 3.1 base score is 6.1, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact affects confidentiality and integrity partially (C:L, I:L), but not availability (A:N). Since the vulnerability is an XSS flaw (CWE-79), it can be exploited to steal session cookies, perform actions on behalf of the user, or deliver further malware payloads. The affected versions include Koha 23.05 and all earlier releases, with no patches or exploit code publicly available at this time. The vulnerability was reserved in March 2024 and published in August 2024. Given Koha's deployment in public and academic libraries, exploitation could lead to unauthorized access to user data or manipulation of library records.

Potential Impact

The primary impact of this vulnerability is the potential compromise of user confidentiality and data integrity within Koha ILS environments. Successful exploitation could allow attackers to execute arbitrary scripts in the context of authenticated users, potentially leading to session hijacking, theft of patron information, or unauthorized actions such as modifying library records or user accounts. While availability is not directly impacted, the loss of trust and integrity in library systems could disrupt operations and user confidence. Since Koha is used worldwide, especially in public, academic, and research libraries, the threat extends to any organization relying on this software for critical library management functions. The requirement for user interaction limits automated exploitation but does not eliminate risk, particularly in environments with less security awareness. No known exploits in the wild reduce immediate risk, but the medium CVSS score suggests timely mitigation is necessary to prevent future attacks.

Mitigation Recommendations

Organizations using Koha ILS 23.05 or earlier should immediately review and apply any available patches or updates from the Koha development community once released. In the absence of official patches, administrators should implement input validation and output encoding on the additonal-contents.pl component to sanitize user-supplied data and prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the Koha interface. Educate users about the risks of interacting with suspicious links or content within the library system to reduce the likelihood of successful exploitation requiring user interaction. Regularly audit and monitor web application logs for unusual activity indicative of attempted XSS attacks. Consider isolating the Koha web interface behind web application firewalls (WAFs) that can detect and block XSS payloads. Finally, maintain an incident response plan tailored to web application attacks to quickly address any exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d98b7ef31ef0b5891c2

Added to database: 2/25/2026, 9:46:00 PM

Last enriched: 2/28/2026, 10:28:24 AM

Last updated: 4/12/2026, 6:23:20 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses