CVE-2024-33326: n/a
A cross-site scripting (XSS) vulnerability in the component XsltResultControllerHtml.jsp of Lumisxp v15.0.x to v16.1.x allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the lumPageID parameter.
AI Analysis
Technical Summary
CVE-2024-33326 is a reflected cross-site scripting (XSS) vulnerability affecting the Lumisxp software platform, specifically versions 15.0.x to 16.1.x. The vulnerability resides in the XsltResultControllerHtml.jsp component, where the lumPageID parameter is insufficiently sanitized, allowing attackers to inject malicious JavaScript or HTML code. When a victim accesses a crafted URL containing the malicious payload in the lumPageID parameter, the injected script executes in the victim's browser context. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is exploitable remotely over the network without requiring authentication, but it does require user interaction (clicking a malicious link). The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates that the attack surface is network-based with low complexity, no privileges required, user interaction needed, and a scope change affecting confidentiality and integrity but not availability. No public exploit code or patches are currently available, so organizations must rely on mitigations such as input validation and output encoding until official fixes are released.
Potential Impact
This XSS vulnerability can have significant impacts on organizations using Lumisxp versions 15.0.x to 16.1.x. Successful exploitation allows attackers to execute arbitrary scripts in users' browsers, potentially leading to theft of session tokens, user impersonation, and unauthorized actions within the affected web application. This undermines user trust and can lead to data leakage or manipulation. Although the vulnerability does not directly affect system availability, the compromise of confidentiality and integrity can facilitate further attacks, including phishing or lateral movement within an organization's network. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments with many users or where social engineering is feasible. The medium CVSS score reflects these moderate but impactful risks. Organizations relying on Lumisxp for critical business processes may face reputational damage and compliance issues if exploited.
Mitigation Recommendations
To mitigate CVE-2024-33326, organizations should implement strict input validation and output encoding on the lumPageID parameter to neutralize malicious payloads. Employing a web application firewall (WAF) with rules to detect and block XSS attack patterns targeting this parameter can provide immediate protection. Security teams should monitor web server logs for suspicious requests containing unusual or encoded scripts in the lumPageID parameter. User awareness training to recognize and avoid clicking suspicious links can reduce the risk of exploitation. Until official patches are released, consider restricting access to the vulnerable Lumisxp components or deploying application-layer proxies that sanitize inputs. Additionally, applying Content Security Policy (CSP) headers can help limit the impact of injected scripts by restricting script execution sources. Regularly check for vendor updates and apply patches promptly once available.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, India, Brazil
CVE-2024-33326: n/a
Description
A cross-site scripting (XSS) vulnerability in the component XsltResultControllerHtml.jsp of Lumisxp v15.0.x to v16.1.x allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the lumPageID parameter.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-33326 is a reflected cross-site scripting (XSS) vulnerability affecting the Lumisxp software platform, specifically versions 15.0.x to 16.1.x. The vulnerability resides in the XsltResultControllerHtml.jsp component, where the lumPageID parameter is insufficiently sanitized, allowing attackers to inject malicious JavaScript or HTML code. When a victim accesses a crafted URL containing the malicious payload in the lumPageID parameter, the injected script executes in the victim's browser context. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is exploitable remotely over the network without requiring authentication, but it does require user interaction (clicking a malicious link). The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates that the attack surface is network-based with low complexity, no privileges required, user interaction needed, and a scope change affecting confidentiality and integrity but not availability. No public exploit code or patches are currently available, so organizations must rely on mitigations such as input validation and output encoding until official fixes are released.
Potential Impact
This XSS vulnerability can have significant impacts on organizations using Lumisxp versions 15.0.x to 16.1.x. Successful exploitation allows attackers to execute arbitrary scripts in users' browsers, potentially leading to theft of session tokens, user impersonation, and unauthorized actions within the affected web application. This undermines user trust and can lead to data leakage or manipulation. Although the vulnerability does not directly affect system availability, the compromise of confidentiality and integrity can facilitate further attacks, including phishing or lateral movement within an organization's network. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments with many users or where social engineering is feasible. The medium CVSS score reflects these moderate but impactful risks. Organizations relying on Lumisxp for critical business processes may face reputational damage and compliance issues if exploited.
Mitigation Recommendations
To mitigate CVE-2024-33326, organizations should implement strict input validation and output encoding on the lumPageID parameter to neutralize malicious payloads. Employing a web application firewall (WAF) with rules to detect and block XSS attack patterns targeting this parameter can provide immediate protection. Security teams should monitor web server logs for suspicious requests containing unusual or encoded scripts in the lumPageID parameter. User awareness training to recognize and avoid clicking suspicious links can reduce the risk of exploitation. Until official patches are released, consider restricting access to the vulnerable Lumisxp components or deploying application-layer proxies that sanitize inputs. Additionally, applying Content Security Policy (CSP) headers can help limit the impact of injected scripts by restricting script execution sources. Regularly check for vendor updates and apply patches promptly once available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-04-23T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c3fb7ef31ef0b561838
Added to database: 2/25/2026, 9:40:15 PM
Last enriched: 2/26/2026, 4:27:49 AM
Last updated: 4/12/2026, 6:22:06 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.