Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30951: n/a

0
Medium
VulnerabilityCVE-2024-30951cvecve-2024-30951
Published: Wed Apr 17 2024 (04/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

FUDforum v3.1.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the chpos parameter at /adm/admsmiley.php.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 12:21:12 UTC

Technical Analysis

CVE-2024-30951 is a reflected cross-site scripting (XSS) vulnerability identified in FUDforum version 3.1.3, a popular open-source forum software. The vulnerability exists in the 'chpos' parameter of the /adm/admsmiley.php administrative script. Reflected XSS occurs when untrusted user input is immediately returned in a web response without proper sanitization or encoding, allowing attackers to craft malicious URLs that execute arbitrary JavaScript in the victim's browser. This can lead to theft of cookies, session tokens, or other sensitive information, as well as manipulation of the web page content or redirection to malicious sites. The CVSS v3.1 score of 6.1 reflects a medium severity, with an attack vector over the network, low complexity, no privileges required, but requiring user interaction (clicking a malicious link). The scope is changed, indicating that the vulnerability affects resources beyond the vulnerable component, potentially impacting the entire user session or application context. No patches or fixes have been officially released at the time of publication, and no known exploits have been observed in the wild. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS. Given the administrative context of the vulnerable script, exploitation could have significant consequences if an administrator or privileged user is targeted. However, the need for user interaction and lack of privilege requirements limit the ease of exploitation somewhat. Organizations running FUDforum 3.1.3 should assess exposure, monitor for suspicious activity, and apply mitigations promptly once available.

Potential Impact

The primary impact of this vulnerability is on confidentiality and integrity. Attackers can steal session cookies or authentication tokens, enabling account hijacking or impersonation. They can also manipulate the content displayed to users, potentially conducting phishing attacks or spreading malware. Since the vulnerability is reflected XSS, it requires tricking users into clicking malicious links, which may limit large-scale automated exploitation but still poses a significant risk to targeted users or administrators. The vulnerability does not affect availability directly. Organizations hosting public or private forums using FUDforum 3.1.3 may face reputational damage, loss of user trust, and potential data breaches if exploited. The administrative context of the vulnerable script increases the risk if privileged users are targeted, potentially leading to broader compromise of forum management functions. The lack of known exploits in the wild suggests limited current exploitation but also indicates the need for proactive mitigation before attackers develop reliable exploit techniques.

Mitigation Recommendations

1. Immediately restrict access to the /adm/admsmiley.php script to trusted IP addresses or internal networks to reduce exposure. 2. Implement web application firewall (WAF) rules to detect and block malicious payloads targeting the 'chpos' parameter, focusing on typical XSS attack patterns such as script tags or event handlers. 3. Educate users and administrators about the risks of clicking untrusted links, especially those that appear to reference forum administrative pages. 4. Monitor web server logs for unusual requests to /adm/admsmiley.php containing suspicious parameter values. 5. If possible, apply input validation and output encoding on the 'chpos' parameter in the application code to neutralize malicious input; if you have development resources, backport or develop a patch following secure coding practices. 6. Keep abreast of official patches or updates from FUDforum maintainers and apply them promptly once available. 7. Consider deploying Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. 8. Regularly audit forum software and dependencies for vulnerabilities and maintain a robust update and patch management process.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dcdb7ef31ef0b58eabe

Added to database: 2/25/2026, 9:46:53 PM

Last enriched: 2/26/2026, 12:21:12 PM

Last updated: 4/12/2026, 7:55:41 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses