Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33326: n/a

0
Medium
VulnerabilityCVE-2024-33326cvecve-2024-33326
Published: Wed Jun 26 2024 (06/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-33326 is a cross-site scripting (XSS) vulnerability found in the XsltResultControllerHtml. jsp component of Lumisxp versions 15. 0. x through 16. 1. x. The flaw allows attackers to inject arbitrary web scripts or HTML via the lumPageID parameter, which can be exploited when a user interacts with a crafted URL or payload. This vulnerability requires user interaction but no authentication, and it can lead to partial compromise of confidentiality and integrity by executing malicious scripts in the context of the victim's browser. The CVSS score is 6. 1 (medium severity), reflecting the moderate impact and ease of exploitation over the network.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:27:49 UTC

Technical Analysis

CVE-2024-33326 is a reflected cross-site scripting (XSS) vulnerability affecting the Lumisxp software platform, specifically versions 15.0.x to 16.1.x. The vulnerability resides in the XsltResultControllerHtml.jsp component, where the lumPageID parameter is insufficiently sanitized, allowing attackers to inject malicious JavaScript or HTML code. When a victim accesses a crafted URL containing the malicious payload in the lumPageID parameter, the injected script executes in the victim's browser context. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is exploitable remotely over the network without requiring authentication, but it does require user interaction (clicking a malicious link). The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates that the attack surface is network-based with low complexity, no privileges required, user interaction needed, and a scope change affecting confidentiality and integrity but not availability. No public exploit code or patches are currently available, so organizations must rely on mitigations such as input validation and output encoding until official fixes are released.

Potential Impact

This XSS vulnerability can have significant impacts on organizations using Lumisxp versions 15.0.x to 16.1.x. Successful exploitation allows attackers to execute arbitrary scripts in users' browsers, potentially leading to theft of session tokens, user impersonation, and unauthorized actions within the affected web application. This undermines user trust and can lead to data leakage or manipulation. Although the vulnerability does not directly affect system availability, the compromise of confidentiality and integrity can facilitate further attacks, including phishing or lateral movement within an organization's network. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments with many users or where social engineering is feasible. The medium CVSS score reflects these moderate but impactful risks. Organizations relying on Lumisxp for critical business processes may face reputational damage and compliance issues if exploited.

Mitigation Recommendations

To mitigate CVE-2024-33326, organizations should implement strict input validation and output encoding on the lumPageID parameter to neutralize malicious payloads. Employing a web application firewall (WAF) with rules to detect and block XSS attack patterns targeting this parameter can provide immediate protection. Security teams should monitor web server logs for suspicious requests containing unusual or encoded scripts in the lumPageID parameter. User awareness training to recognize and avoid clicking suspicious links can reduce the risk of exploitation. Until official patches are released, consider restricting access to the vulnerable Lumisxp components or deploying application-layer proxies that sanitize inputs. Additionally, applying Content Security Policy (CSP) headers can help limit the impact of injected scripts by restricting script execution sources. Regularly check for vendor updates and apply patches promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-23T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c3fb7ef31ef0b561838

Added to database: 2/25/2026, 9:40:15 PM

Last enriched: 2/26/2026, 4:27:49 AM

Last updated: 2/26/2026, 7:58:55 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats