CVE-2024-37672: n/a
CVE-2024-37672 is a Cross Site Scripting (XSS) vulnerability in the Tessi Docubase Document Management product version 5. x. It allows a remote attacker with limited privileges and requiring user interaction to execute arbitrary code via the idactivity parameter. The vulnerability impacts confidentiality and integrity but not availability. Exploitation requires the attacker to trick a user into interacting with a crafted link or input. No known exploits are currently reported in the wild. The CVSS score is 5. 4 (medium severity), reflecting moderate risk due to the need for user interaction and limited privileges. Organizations using Tessi Docubase should prioritize input validation and sanitization for the idactivity parameter and monitor for suspicious activity. Countries with significant use of this product, especially in Europe where Tessi is headquartered and markets heavily, are at higher risk.
AI Analysis
Technical Summary
CVE-2024-37672 is a medium-severity Cross Site Scripting (XSS) vulnerability identified in Tessi Docubase Document Management software, specifically version 5.x. The vulnerability arises from improper sanitization of the idactivity parameter, which can be manipulated by a remote attacker to inject malicious scripts. When a user with limited privileges interacts with a crafted URL or input containing the malicious payload, the script executes in the context of the victim’s browser. This can lead to unauthorized actions such as session hijacking, data theft, or manipulation of the user interface, compromising confidentiality and integrity of data. The vulnerability requires user interaction (UI:R) and limited privileges (PR:L), meaning the attacker must lure a user to trigger the exploit, and cannot exploit it without some level of access. The scope is changed (S:C), indicating the vulnerability affects resources beyond the attacker’s privileges, potentially impacting other users or system components. The CVSS vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) reflects network attack vector, low attack complexity, and no impact on availability. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The CWE-79 classification confirms this is a classic reflected or stored XSS issue.
Potential Impact
The primary impact of this vulnerability is on confidentiality and integrity, as attackers can execute arbitrary scripts in the context of authenticated users, potentially stealing sensitive information such as session tokens or manipulating document management workflows. While availability is not affected, the breach of confidentiality and integrity can lead to unauthorized data access, privilege escalation, or further exploitation within the organization’s network. Organizations relying on Tessi Docubase for document management may face risks of data leakage, compliance violations, and reputational damage. The requirement for user interaction and limited privileges reduces the ease of exploitation but does not eliminate risk, especially in environments with many users or where phishing attacks are common. The lack of known exploits in the wild suggests the threat is currently theoretical but could be weaponized if attackers develop exploit code.
Mitigation Recommendations
Organizations should implement strict input validation and output encoding on the idactivity parameter to prevent injection of malicious scripts. Applying Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. User education on phishing and suspicious links is critical to reduce the risk of user interaction exploitation. Monitoring web application logs for unusual parameter values or repeated attempts to inject scripts can aid in early detection. If possible, upgrade or patch the Tessi Docubase product once a vendor fix is released. In the interim, consider deploying Web Application Firewalls (WAFs) with rules targeting XSS payloads on the affected parameter. Restricting user privileges and session timeouts can also limit the window of opportunity for attackers. Regular security assessments and penetration testing focused on web application inputs will help identify similar vulnerabilities.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Belgium, Netherlands, Switzerland, United States, Canada
CVE-2024-37672: n/a
Description
CVE-2024-37672 is a Cross Site Scripting (XSS) vulnerability in the Tessi Docubase Document Management product version 5. x. It allows a remote attacker with limited privileges and requiring user interaction to execute arbitrary code via the idactivity parameter. The vulnerability impacts confidentiality and integrity but not availability. Exploitation requires the attacker to trick a user into interacting with a crafted link or input. No known exploits are currently reported in the wild. The CVSS score is 5. 4 (medium severity), reflecting moderate risk due to the need for user interaction and limited privileges. Organizations using Tessi Docubase should prioritize input validation and sanitization for the idactivity parameter and monitor for suspicious activity. Countries with significant use of this product, especially in Europe where Tessi is headquartered and markets heavily, are at higher risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-37672 is a medium-severity Cross Site Scripting (XSS) vulnerability identified in Tessi Docubase Document Management software, specifically version 5.x. The vulnerability arises from improper sanitization of the idactivity parameter, which can be manipulated by a remote attacker to inject malicious scripts. When a user with limited privileges interacts with a crafted URL or input containing the malicious payload, the script executes in the context of the victim’s browser. This can lead to unauthorized actions such as session hijacking, data theft, or manipulation of the user interface, compromising confidentiality and integrity of data. The vulnerability requires user interaction (UI:R) and limited privileges (PR:L), meaning the attacker must lure a user to trigger the exploit, and cannot exploit it without some level of access. The scope is changed (S:C), indicating the vulnerability affects resources beyond the attacker’s privileges, potentially impacting other users or system components. The CVSS vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) reflects network attack vector, low attack complexity, and no impact on availability. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The CWE-79 classification confirms this is a classic reflected or stored XSS issue.
Potential Impact
The primary impact of this vulnerability is on confidentiality and integrity, as attackers can execute arbitrary scripts in the context of authenticated users, potentially stealing sensitive information such as session tokens or manipulating document management workflows. While availability is not affected, the breach of confidentiality and integrity can lead to unauthorized data access, privilege escalation, or further exploitation within the organization’s network. Organizations relying on Tessi Docubase for document management may face risks of data leakage, compliance violations, and reputational damage. The requirement for user interaction and limited privileges reduces the ease of exploitation but does not eliminate risk, especially in environments with many users or where phishing attacks are common. The lack of known exploits in the wild suggests the threat is currently theoretical but could be weaponized if attackers develop exploit code.
Mitigation Recommendations
Organizations should implement strict input validation and output encoding on the idactivity parameter to prevent injection of malicious scripts. Applying Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. User education on phishing and suspicious links is critical to reduce the risk of user interaction exploitation. Monitoring web application logs for unusual parameter values or repeated attempts to inject scripts can aid in early detection. If possible, upgrade or patch the Tessi Docubase product once a vendor fix is released. In the interim, consider deploying Web Application Firewalls (WAFs) with rules targeting XSS payloads on the affected parameter. Restricting user privileges and session timeouts can also limit the window of opportunity for attackers. Regular security assessments and penetration testing focused on web application inputs will help identify similar vulnerabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-06-10T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c6db7ef31ef0b563e1a
Added to database: 2/25/2026, 9:41:01 PM
Last enriched: 2/26/2026, 5:18:41 AM
Last updated: 2/26/2026, 12:47:04 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14343: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Dokuzsoft Technology Ltd. E-Commerce Product
HighCVE-2026-1198: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Simple SA Simple.ERP
HighCVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.