Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33905: n/a

0
Medium
VulnerabilityCVE-2024-33905cvecve-2024-33905
Published: Mon Apr 29 2024 (04/29/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In Telegram WebK before 2.0.0 (488), a crafted Mini Web App allows XSS via the postMessage web_app_open_link event type.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:06:28 UTC

Technical Analysis

CVE-2024-33905 is a cross-site scripting (XSS) vulnerability identified in Telegram WebK prior to version 2.0.0 (488). This vulnerability stems from improper sanitization or validation of input data within the postMessage event handler, specifically the web_app_open_link event type used by Mini Web Apps embedded in Telegram WebK. An attacker can craft a malicious Mini Web App that triggers this event with specially crafted payloads, leading to the execution of arbitrary JavaScript in the context of the Telegram WebK client. The vulnerability requires the attacker to have limited privileges (PR:L) and necessitates user interaction (UI:R), such as clicking a link or interacting with the malicious Mini Web App. The CVSS 3.1 base score is 4.6, reflecting a medium severity level, with attack vector being network (AV:N), low attack complexity (AC:L), and no confidentiality impact but limited integrity and availability impacts (C:N/I:L/A:L). This vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common XSS weakness. No patches or exploits are currently publicly available, but the risk remains for users of affected Telegram WebK versions. The vulnerability could allow attackers to manipulate the user interface, perform actions on behalf of the user, or disrupt service availability within the Telegram WebK environment.

Potential Impact

The primary impact of CVE-2024-33905 is on the integrity and availability of the Telegram WebK client environment. Successful exploitation could allow attackers to execute arbitrary scripts, potentially leading to UI manipulation, unauthorized actions within the web client, or denial of service conditions. Although confidentiality is not directly impacted, the integrity compromise could facilitate phishing or social engineering attacks by altering displayed content. The requirement for user interaction and limited privileges reduces the likelihood of widespread automated exploitation but does not eliminate targeted attacks against high-value users or organizations relying on Telegram WebK for communication. Organizations using Telegram WebK in sensitive environments could face operational disruptions or reputational damage if attackers leverage this vulnerability to spread misinformation or disrupt communications.

Mitigation Recommendations

1. Update Telegram WebK to version 2.0.0 (488) or later as soon as an official patch is released to address this vulnerability. 2. Until patching is possible, restrict or disable the use of Mini Web Apps within Telegram WebK where feasible, especially in high-risk environments. 3. Implement strict Content Security Policies (CSP) to limit the execution of unauthorized scripts and reduce the impact of XSS attacks. 4. Educate users to be cautious when interacting with Mini Web Apps or links within Telegram WebK, emphasizing the risk of malicious content. 5. Monitor Telegram WebK usage and network traffic for unusual activity that could indicate exploitation attempts. 6. Encourage the Telegram development team to provide timely patches and security advisories to users. 7. Employ browser security features such as sandboxing and script blocking extensions to mitigate potential attack vectors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-29T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c4ab7ef31ef0b562043

Added to database: 2/25/2026, 9:40:26 PM

Last enriched: 2/28/2026, 3:06:28 AM

Last updated: 4/12/2026, 5:08:28 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses