Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30884: n/a

0
High
VulnerabilityCVE-2024-30884cvecve-2024-30884
Published: Thu Apr 11 2024 (04/11/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Reflected Cross-Site Scripting (XSS) vulnerability in Discuz! version X3.4 20220811, allows remote attackers to execute arbitrary code and obtain sensitive information via crafted payload to the primarybegin parameter in the misc.php component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 13:40:49 UTC

Technical Analysis

CVE-2024-30884 is a reflected Cross-Site Scripting (XSS) vulnerability affecting Discuz! version X3.4 20220811, specifically targeting the primarybegin parameter within the misc.php component. Reflected XSS occurs when user-supplied input is immediately returned by a web application without proper sanitization or encoding, allowing attackers to inject malicious scripts. In this case, an attacker crafts a malicious URL containing a payload in the primarybegin parameter. When a victim clicks this URL, the injected script executes in the victim's browser context, enabling arbitrary code execution. This can lead to session hijacking, theft of sensitive data such as cookies or credentials, and potentially further exploitation of the victim's environment. The vulnerability has a CVSS 3.1 base score of 7.1, reflecting its high severity due to network attack vector, low attack complexity, no privileges required, but requiring user interaction. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the vulnerable component, potentially impacting the entire application or user session. The confidentiality, integrity, and availability impacts are all rated low to medium, as the attacker can steal information, manipulate data, or cause partial denial of service. No known exploits have been reported in the wild yet, and no official patches are currently linked, suggesting that organizations should implement interim mitigations. The vulnerability is categorized under CWE-79, a well-known class of XSS issues. Discuz! is a popular forum software, especially in Chinese-speaking regions, which increases the risk profile in those markets.

Potential Impact

The impact of CVE-2024-30884 is significant for organizations running Discuz! X3.4 forums, as successful exploitation allows attackers to execute arbitrary scripts in users' browsers. This can lead to theft of session cookies, enabling account takeover, unauthorized access to sensitive information, and potential spread of malware through malicious scripts. The reflected nature means attacks require social engineering to lure users to malicious URLs. The vulnerability can undermine user trust and damage organizational reputation. Additionally, attackers could leverage this XSS to pivot to more severe attacks, such as privilege escalation or persistent XSS if combined with other vulnerabilities. The availability impact is lower but still present if attackers disrupt user sessions or inject scripts that degrade service. Given Discuz!'s widespread use in certain regions, the threat could affect a large user base, especially in online communities and businesses relying on this platform for communication and customer engagement.

Mitigation Recommendations

To mitigate CVE-2024-30884, organizations should immediately implement strict input validation and output encoding on the primarybegin parameter in misc.php to neutralize malicious scripts. Employ context-aware encoding (e.g., HTML entity encoding) to prevent script injection. Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Educate users about the risks of clicking unknown or suspicious links to reduce social engineering success. Monitor web server logs for unusual requests targeting the primarybegin parameter. If possible, upgrade to a patched version of Discuz! once available or apply vendor-provided patches. In the interim, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block XSS payloads targeting this parameter. Conduct regular security assessments and penetration tests focusing on input handling in web applications. Finally, ensure that session cookies are set with HttpOnly and Secure flags to reduce the impact of stolen cookies.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dcdb7ef31ef0b58ea11

Added to database: 2/25/2026, 9:46:53 PM

Last enriched: 2/26/2026, 1:40:49 PM

Last updated: 4/12/2026, 4:21:41 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses