Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31609: n/a

0
High
VulnerabilityCVE-2024-31609cvecve-2024-31609
Published: Thu Apr 25 2024 (04/25/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross Site Scripting (XSS) vulnerability in BOSSCMS v3.10 allows attackers to run arbitrary code via the header code and footer code fields in code configuration.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 12:26:14 UTC

Technical Analysis

CVE-2024-31609 is a Cross Site Scripting (XSS) vulnerability identified in BOSSCMS version 3.10. The vulnerability arises from insufficient input sanitization in the header code and footer code fields within the CMS's code configuration interface. Attackers can exploit this flaw by injecting malicious scripts into these fields, which are then executed in the context of users visiting the affected web pages. This type of vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 score of 7.1 reflects a high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability to a low degree individually but collectively significant. No patches or known exploits are currently reported, but the vulnerability's nature makes it a prime target for attackers aiming to execute arbitrary JavaScript code, potentially leading to session hijacking, defacement, or malware distribution. BOSSCMS is a content management system primarily used in Chinese-speaking regions, which influences the geographic risk profile. The vulnerability demands immediate attention to prevent exploitation in environments where BOSSCMS is deployed.

Potential Impact

The exploitation of CVE-2024-31609 can lead to several adverse impacts on organizations using BOSSCMS. Attackers can execute arbitrary scripts in the context of legitimate users, potentially stealing session cookies, redirecting users to malicious sites, or injecting malware. This compromises user confidentiality and can lead to unauthorized access or data leakage. Integrity is affected as attackers can manipulate displayed content or inject fraudulent information. Availability might be impacted if attackers use the vulnerability to perform defacement or disrupt normal CMS operations. Given the vulnerability requires no authentication and has low complexity, it can be exploited by remote attackers with minimal effort, increasing the risk of widespread attacks. Organizations relying on BOSSCMS for public-facing websites risk reputational damage, loss of customer trust, and potential regulatory penalties if user data is compromised. The lack of known patches increases the urgency for mitigation.

Mitigation Recommendations

To mitigate CVE-2024-31609, organizations should immediately review and sanitize all inputs in the header and footer code configuration fields within BOSSCMS. Implement strict input validation and output encoding to neutralize any injected scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on web pages. Monitor web server logs and application behavior for unusual script injections or user activity indicative of exploitation attempts. If possible, restrict access to the code configuration interface to trusted administrators only and enforce multi-factor authentication to reduce the risk of unauthorized changes. Regularly back up website content and configurations to enable quick restoration in case of defacement or compromise. Stay informed about BOSSCMS updates or patches addressing this vulnerability and apply them promptly once available. Additionally, consider deploying web application firewalls (WAFs) with rules targeting XSS attack patterns specific to BOSSCMS.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dd3b7ef31ef0b58eef4

Added to database: 2/25/2026, 9:46:59 PM

Last enriched: 2/26/2026, 12:26:14 PM

Last updated: 4/12/2026, 1:58:56 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses