Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-35540: n/a

0
High
VulnerabilityCVE-2024-35540cvecve-2024-35540
Published: Tue Aug 20 2024 (08/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A stored cross-site scripting (XSS) vulnerability in Typecho v1.3.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 04:56:31 UTC

Technical Analysis

CVE-2024-35540 identifies a stored cross-site scripting (XSS) vulnerability in Typecho version 1.3.0, a lightweight PHP-based blogging platform. Stored XSS occurs when malicious input is saved by the application and later rendered in users' browsers without proper sanitization or encoding. In this case, attackers with at least limited privileges (PR:L) can inject crafted payloads containing arbitrary JavaScript or HTML. When other users access the affected pages, the malicious scripts execute in their browsers, potentially stealing cookies, session tokens, or performing actions on behalf of the victim. The vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L), but requires user interaction (UI:R) such as visiting a maliciously crafted page. The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component. The CVSS vector indicates low confidentiality impact (C:L) but high integrity (I:H) and availability (A:H) impacts, reflecting the potential for attackers to manipulate data and disrupt services. No patches or known exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. CWE-79 categorizes this as a classic XSS flaw, emphasizing the need for input validation and output encoding. The lack of affected version details beyond 1.3.0 suggests the vulnerability may be limited to this release or similar builds. Organizations running Typecho 1.3.0 or related versions should audit their input handling and apply mitigations to prevent exploitation.

Potential Impact

The impact of CVE-2024-35540 is significant for organizations using Typecho 1.3.0 as it enables attackers to execute arbitrary scripts in the context of other users, potentially leading to session hijacking, credential theft, unauthorized actions, and defacement. The high integrity and availability impact scores indicate attackers could alter or delete content, disrupt service availability, or inject malicious content that damages user trust. Confidentiality impact is lower but still present due to possible data leakage via stolen cookies or tokens. Exploitation requires some user privileges and interaction, which limits mass exploitation but does not eliminate risk in environments with multiple users or contributors. The absence of known exploits in the wild currently reduces immediate risk but also means defenders must act proactively. Organizations relying on Typecho for blogging or content management face reputational damage, compliance issues, and potential data breaches if this vulnerability is exploited. The threat is especially relevant for public-facing websites with user-generated content or multi-user access.

Mitigation Recommendations

To mitigate CVE-2024-35540, organizations should first verify if they are running Typecho version 1.3.0 or any affected variants. Immediate steps include implementing strict input validation and sanitization on all user-supplied data, especially content fields that are stored and rendered. Employ context-aware output encoding (e.g., HTML entity encoding) to neutralize injected scripts before rendering in browsers. Limit user privileges to the minimum necessary to reduce the risk of malicious payload injection. Monitor web application logs for suspicious input patterns or unexpected script content. Deploy web application firewalls (WAFs) with rules targeting XSS payloads to provide an additional layer of defense. Since no official patch is currently available, consider temporary workarounds such as disabling or restricting features that accept rich HTML input. Stay alert for vendor updates or community patches and apply them promptly once released. Conduct security awareness training for users and administrators to recognize and report suspicious activity. Finally, perform regular security testing, including automated scanning and manual code reviews, to detect and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-17T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c5bb7ef31ef0b56346d

Added to database: 2/25/2026, 9:40:43 PM

Last enriched: 2/26/2026, 4:56:31 AM

Last updated: 4/12/2026, 3:38:55 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses