Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33465: n/a

0
High
VulnerabilityCVE-2024-33465cvecve-2024-33465
Published: Tue Apr 30 2024 (04/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross Site Scripting vulnerability in MajorDoMo before v.0662e5e allows an attacker to escalate privileges via the the thumb/thumb.php component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 02:57:16 UTC

Technical Analysis

CVE-2024-33465 is a Cross Site Scripting (XSS) vulnerability identified in the MajorDoMo home automation platform, specifically within the thumb/thumb.php component. XSS vulnerabilities occur when an application does not properly sanitize user-supplied input, allowing attackers to inject malicious scripts that execute in the victim's browser. In this case, the vulnerability enables attackers to escalate privileges by leveraging the XSS flaw to execute arbitrary scripts, potentially leading to unauthorized actions within the MajorDoMo environment. The CVSS 3.1 base score of 7.1 reflects a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that exploitation can affect resources beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability to a low degree each (C:L/I:L/A:L). Although no known exploits are currently reported in the wild and no patches have been released, the vulnerability poses a significant risk due to the potential for privilege escalation and the critical role MajorDoMo plays in home automation. The lack of affected version specifics suggests the vulnerability may impact multiple or all versions prior to a fix. The CWE-79 classification confirms this is a classic reflected or stored XSS issue. Attackers exploiting this vulnerability could manipulate device controls, access sensitive data, or disrupt automation workflows.

Potential Impact

The impact of CVE-2024-33465 on organizations using MajorDoMo can be substantial. Successful exploitation can lead to privilege escalation, allowing attackers to perform unauthorized actions within the home automation system. This can compromise the confidentiality of user data, including personal and device information, and integrity by altering device states or automation rules. Availability could also be affected if attackers disrupt the normal operation of connected devices or the platform itself. For organizations relying on MajorDoMo for critical automation tasks, such disruptions could affect operational continuity and user safety. Additionally, attackers could leverage the XSS vulnerability as a pivot point for further attacks within the network, especially if the platform is integrated with other systems. The requirement for user interaction means social engineering or phishing could be used to trigger exploitation, increasing the risk in environments with less security awareness. Although no exploits are currently known in the wild, the high CVSS score and privilege escalation potential make this a significant threat that demands attention.

Mitigation Recommendations

To mitigate CVE-2024-33465, organizations should implement the following specific measures: 1) Apply strict input validation and sanitization on all user-supplied data, especially in the thumb/thumb.php component, to prevent injection of malicious scripts. 2) Employ output encoding techniques to ensure that any data rendered in the browser is treated as data, not executable code. 3) Restrict access to the vulnerable component by implementing network-level controls such as IP whitelisting or VPN access to reduce exposure. 4) Educate users about the risks of interacting with untrusted links or content that could trigger XSS attacks, reducing the likelihood of successful user interaction exploitation. 5) Monitor logs and network traffic for unusual activity indicative of attempted exploitation. 6) Engage with the MajorDoMo community or vendor for updates and patches, and prioritize timely application once available. 7) Consider deploying web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting this component. 8) Conduct regular security assessments and penetration testing focused on web application vulnerabilities to identify and remediate similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-23T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c43b7ef31ef0b561b10

Added to database: 2/25/2026, 9:40:19 PM

Last enriched: 2/28/2026, 2:57:16 AM

Last updated: 4/12/2026, 9:12:29 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses