Skip to main content

CVE-2024-37396: n/a in n/a

High
VulnerabilityCVE-2024-37396cvecve-2024-37396
Published: Tue Jun 10 2025 (06/10/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

A stored cross-site scripting (XSS) vulnerability in the Calendar function of REDCap 13.1.9 allows authenticated users to execute arbitrary web script or HTML by injecting a crafted payload into the 'Notes' field of a calendar event. This could lead to the execution of malicious scripts when the event is viewed. Updating to version 14.2.1 or later is recommended to remediate this vulnerability.

AI-Powered Analysis

AILast updated: 07/10/2025, 20:02:21 UTC

Technical Analysis

CVE-2024-37396 is a stored cross-site scripting (XSS) vulnerability identified in the Calendar function of REDCap version 13.1.9. REDCap (Research Electronic Data Capture) is a widely used secure web application for building and managing online surveys and databases, often employed in academic, clinical, and research environments. The vulnerability allows an authenticated user to inject arbitrary web scripts or HTML code into the 'Notes' field of a calendar event. Because the payload is stored, it executes whenever the calendar event is viewed by any user with access, potentially enabling malicious scripts to run in the context of the victim's browser session. This can lead to session hijacking, unauthorized actions performed on behalf of the user, data theft, or the delivery of further malware. The vulnerability requires the attacker to have authenticated access, which limits exploitation to users with some level of legitimate access to the REDCap instance. However, given REDCap's use in sensitive research and healthcare data environments, the impact of such an attack can be significant. The recommended remediation is to update REDCap to version 14.2.1 or later, where the vulnerability has been addressed. No known exploits are reported in the wild as of the publication date, but the high severity rating indicates the potential for serious impact if exploited.

Potential Impact

For European organizations, particularly those in healthcare, academic research, and clinical trial sectors where REDCap is commonly deployed, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive personal health information (PHI) and research data, violating GDPR and other data protection regulations. The ability to execute arbitrary scripts could also facilitate lateral movement within the network, privilege escalation, or the deployment of ransomware or other malware. The stored nature of the XSS means multiple users could be affected once the malicious payload is injected, amplifying the potential damage. Additionally, reputational harm and regulatory penalties could result from data breaches stemming from this vulnerability. Given the criticality of data handled by REDCap, the impact on confidentiality and integrity is particularly concerning, while availability may also be indirectly affected if systems are compromised or taken offline for remediation.

Mitigation Recommendations

European organizations using REDCap should prioritize upgrading to version 14.2.1 or later immediately to remediate this vulnerability. Until the update is applied, implement strict access controls to limit authenticated user permissions, especially restricting calendar event creation and editing to trusted personnel only. Conduct thorough input validation and sanitization on the 'Notes' field at the application level if possible, to detect and block malicious payloads. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing REDCap. Regularly audit calendar events for suspicious or unexpected content. Enhance monitoring and logging to detect anomalous user behavior that could indicate exploitation attempts. Educate users about the risks of XSS and encourage vigilance when interacting with calendar events. Finally, ensure that incident response plans include scenarios involving web application XSS attacks to enable rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-07T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68487f501b0bd07c393899d5

Added to database: 6/10/2025, 6:54:08 PM

Last enriched: 7/10/2025, 8:02:21 PM

Last updated: 7/30/2025, 4:15:20 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats