CVE-2024-33326: n/a
CVE-2024-33326 is a cross-site scripting (XSS) vulnerability found in the XsltResultControllerHtml. jsp component of Lumisxp versions 15. 0. x through 16. 1. x. The flaw allows attackers to inject arbitrary web scripts or HTML via the lumPageID parameter, which can be exploited when a user interacts with a crafted URL or payload. This vulnerability requires user interaction but no authentication, and it can lead to partial compromise of confidentiality and integrity by executing malicious scripts in the context of the victim's browser. The CVSS score is 6. 1 (medium severity), reflecting the moderate impact and ease of exploitation over the network.
AI Analysis
Technical Summary
CVE-2024-33326 is a reflected cross-site scripting (XSS) vulnerability affecting the Lumisxp software platform, specifically versions 15.0.x to 16.1.x. The vulnerability resides in the XsltResultControllerHtml.jsp component, where the lumPageID parameter is insufficiently sanitized, allowing attackers to inject malicious JavaScript or HTML code. When a victim accesses a crafted URL containing the malicious payload in the lumPageID parameter, the injected script executes in the victim's browser context. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is exploitable remotely over the network without requiring authentication, but it does require user interaction (clicking a malicious link). The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates that the attack surface is network-based with low complexity, no privileges required, user interaction needed, and a scope change affecting confidentiality and integrity but not availability. No public exploit code or patches are currently available, so organizations must rely on mitigations such as input validation and output encoding until official fixes are released.
Potential Impact
This XSS vulnerability can have significant impacts on organizations using Lumisxp versions 15.0.x to 16.1.x. Successful exploitation allows attackers to execute arbitrary scripts in users' browsers, potentially leading to theft of session tokens, user impersonation, and unauthorized actions within the affected web application. This undermines user trust and can lead to data leakage or manipulation. Although the vulnerability does not directly affect system availability, the compromise of confidentiality and integrity can facilitate further attacks, including phishing or lateral movement within an organization's network. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments with many users or where social engineering is feasible. The medium CVSS score reflects these moderate but impactful risks. Organizations relying on Lumisxp for critical business processes may face reputational damage and compliance issues if exploited.
Mitigation Recommendations
To mitigate CVE-2024-33326, organizations should implement strict input validation and output encoding on the lumPageID parameter to neutralize malicious payloads. Employing a web application firewall (WAF) with rules to detect and block XSS attack patterns targeting this parameter can provide immediate protection. Security teams should monitor web server logs for suspicious requests containing unusual or encoded scripts in the lumPageID parameter. User awareness training to recognize and avoid clicking suspicious links can reduce the risk of exploitation. Until official patches are released, consider restricting access to the vulnerable Lumisxp components or deploying application-layer proxies that sanitize inputs. Additionally, applying Content Security Policy (CSP) headers can help limit the impact of injected scripts by restricting script execution sources. Regularly check for vendor updates and apply patches promptly once available.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, India, Brazil
CVE-2024-33326: n/a
Description
CVE-2024-33326 is a cross-site scripting (XSS) vulnerability found in the XsltResultControllerHtml. jsp component of Lumisxp versions 15. 0. x through 16. 1. x. The flaw allows attackers to inject arbitrary web scripts or HTML via the lumPageID parameter, which can be exploited when a user interacts with a crafted URL or payload. This vulnerability requires user interaction but no authentication, and it can lead to partial compromise of confidentiality and integrity by executing malicious scripts in the context of the victim's browser. The CVSS score is 6. 1 (medium severity), reflecting the moderate impact and ease of exploitation over the network.
AI-Powered Analysis
Technical Analysis
CVE-2024-33326 is a reflected cross-site scripting (XSS) vulnerability affecting the Lumisxp software platform, specifically versions 15.0.x to 16.1.x. The vulnerability resides in the XsltResultControllerHtml.jsp component, where the lumPageID parameter is insufficiently sanitized, allowing attackers to inject malicious JavaScript or HTML code. When a victim accesses a crafted URL containing the malicious payload in the lumPageID parameter, the injected script executes in the victim's browser context. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is exploitable remotely over the network without requiring authentication, but it does require user interaction (clicking a malicious link). The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates that the attack surface is network-based with low complexity, no privileges required, user interaction needed, and a scope change affecting confidentiality and integrity but not availability. No public exploit code or patches are currently available, so organizations must rely on mitigations such as input validation and output encoding until official fixes are released.
Potential Impact
This XSS vulnerability can have significant impacts on organizations using Lumisxp versions 15.0.x to 16.1.x. Successful exploitation allows attackers to execute arbitrary scripts in users' browsers, potentially leading to theft of session tokens, user impersonation, and unauthorized actions within the affected web application. This undermines user trust and can lead to data leakage or manipulation. Although the vulnerability does not directly affect system availability, the compromise of confidentiality and integrity can facilitate further attacks, including phishing or lateral movement within an organization's network. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments with many users or where social engineering is feasible. The medium CVSS score reflects these moderate but impactful risks. Organizations relying on Lumisxp for critical business processes may face reputational damage and compliance issues if exploited.
Mitigation Recommendations
To mitigate CVE-2024-33326, organizations should implement strict input validation and output encoding on the lumPageID parameter to neutralize malicious payloads. Employing a web application firewall (WAF) with rules to detect and block XSS attack patterns targeting this parameter can provide immediate protection. Security teams should monitor web server logs for suspicious requests containing unusual or encoded scripts in the lumPageID parameter. User awareness training to recognize and avoid clicking suspicious links can reduce the risk of exploitation. Until official patches are released, consider restricting access to the vulnerable Lumisxp components or deploying application-layer proxies that sanitize inputs. Additionally, applying Content Security Policy (CSP) headers can help limit the impact of injected scripts by restricting script execution sources. Regularly check for vendor updates and apply patches promptly once available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-04-23T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c3fb7ef31ef0b561838
Added to database: 2/25/2026, 9:40:15 PM
Last enriched: 2/26/2026, 4:27:49 AM
Last updated: 2/26/2026, 7:58:55 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.