Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-32338: n/a

0
Medium
VulnerabilityCVE-2024-32338cvecve-2024-32338
Published: Wed Apr 17 2024 (04/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the PAGE TITLE parameter under the Current Page module.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 02:37:30 UTC

Technical Analysis

CVE-2024-32338 is a cross-site scripting (XSS) vulnerability identified in WonderCMS version 3.4.3, a lightweight content management system. The vulnerability resides in the Settings section within the PAGE TITLE parameter of the Current Page module. An attacker can craft a malicious payload that, when injected into this parameter, allows execution of arbitrary JavaScript or HTML in the context of the victim's browser. This type of vulnerability is classified under CWE-79. The attack vector is network-based and does not require any privileges or authentication, but it does require user interaction, such as a victim visiting a maliciously crafted page or link. The vulnerability impacts confidentiality and integrity by potentially allowing theft of session cookies, defacement, or redirection attacks, but it does not affect system availability. The CVSS v3.1 base score is 5.4, indicating medium severity, with the vector string AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N. No patches or official fixes have been published at the time of disclosure, and no known exploits have been reported in the wild. WonderCMS is used globally but has a smaller market share compared to major CMS platforms, which limits the overall exposure but still poses a risk to affected sites. The vulnerability highlights the need for proper input sanitization and output encoding in web applications to prevent XSS attacks.

Potential Impact

The primary impact of CVE-2024-32338 is on the confidentiality and integrity of affected web applications running WonderCMS 3.4.3. Successful exploitation allows attackers to execute arbitrary scripts in the context of users' browsers, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the user. While availability is not directly impacted, the trustworthiness of the affected websites can be compromised, leading to reputational damage. Organizations relying on WonderCMS for public-facing websites or intranet portals may face risks of data leakage or user credential compromise. Since no authentication is required, any visitor to a vulnerable site could be targeted, increasing the attack surface. The lack of known exploits in the wild currently reduces immediate risk, but the vulnerability could be weaponized in targeted phishing or social engineering campaigns. Overall, the impact is moderate but significant enough to warrant prompt attention, especially for organizations handling sensitive user data or operating in regulated industries.

Mitigation Recommendations

To mitigate CVE-2024-32338, organizations should first monitor WonderCMS official channels for patches or updates addressing this vulnerability and apply them promptly once available. In the interim, implement strict input validation and output encoding on the PAGE TITLE parameter within the Current Page module to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Web application firewalls (WAFs) can be configured to detect and block common XSS payload patterns targeting WonderCMS. Educate users and administrators about the risks of clicking untrusted links or visiting suspicious pages on affected sites. Conduct regular security assessments and code reviews focusing on input handling in CMS modules. If feasible, consider temporarily disabling or restricting access to the vulnerable Settings section until a fix is applied. Additionally, enable HTTP-only and secure flags on cookies to reduce the impact of potential session hijacking. These targeted measures go beyond generic advice by focusing on the specific vulnerable parameter and leveraging layered defenses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c35b7ef31ef0b561287

Added to database: 2/25/2026, 9:40:05 PM

Last enriched: 2/28/2026, 2:37:30 AM

Last updated: 4/12/2026, 7:40:49 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses