Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37828: n/a

0
Medium
VulnerabilityCVE-2024-37828cvecve-2024-37828
Published: Mon Jun 17 2024 (06/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-37828 is a stored cross-site scripting (XSS) vulnerability in Vermeg Agile Reporter version 23. 2. 1. It allows attackers with high privileges to inject malicious scripts or HTML via the Message field in the Set Broadcast Message module. Exploitation requires user interaction and privileges, and it can lead to limited confidentiality and integrity impacts. No known public exploits exist yet, and no patches have been published. The vulnerability has a CVSS score of 4. 8, indicating medium severity. Organizations using this software should carefully control access and sanitize inputs to mitigate risk. This vulnerability primarily affects environments where Vermeg Agile Reporter is deployed, especially in financial and regulatory sectors.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:24:54 UTC

Technical Analysis

CVE-2024-37828 is a stored cross-site scripting (XSS) vulnerability identified in Vermeg Agile Reporter version 23.2.1. The vulnerability resides in the Set Broadcast Message module, specifically in the Message field, where an attacker with high privileges can inject crafted payloads containing arbitrary web scripts or HTML. Stored XSS means the malicious payload is saved on the server and served to other users, potentially allowing attackers to execute scripts in the context of other users’ browsers. This can lead to session hijacking, unauthorized actions, or data theft. The CVSS 3.1 vector (AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N) indicates that the attack is network exploitable with low complexity but requires high privileges and user interaction, affecting confidentiality and integrity with a scope change. No patches or known exploits are currently available, but the vulnerability is publicly disclosed. CWE-79 categorizes it as a classic XSS issue, emphasizing improper input validation and output encoding. The vulnerability’s impact is limited by the need for authenticated high-privilege access and user interaction, but it remains a significant risk in environments where trusted users can be compromised or social engineered.

Potential Impact

The primary impact of CVE-2024-37828 is on confidentiality and integrity within affected Vermeg Agile Reporter deployments. Attackers who gain high-level access can inject malicious scripts that execute in other users’ browsers, potentially stealing session tokens, performing unauthorized actions, or manipulating displayed data. This can lead to data leakage, unauthorized report modifications, or further compromise of user accounts. Since the vulnerability requires high privileges and user interaction, the attack surface is limited but still critical in sensitive environments such as financial institutions, regulatory bodies, or enterprises relying on Agile Reporter for compliance and reporting. The absence of patches increases the window of exposure. Organizations worldwide using this software risk targeted attacks that could disrupt reporting integrity and confidentiality, impacting business operations and regulatory compliance.

Mitigation Recommendations

To mitigate CVE-2024-37828, organizations should immediately restrict access to the Set Broadcast Message module to only trusted, essential users with high privileges. Implement strict input validation and output encoding on the Message field to prevent injection of malicious scripts. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS payloads. Monitor logs for unusual activity related to broadcast messages and user interactions. Since no patches are currently available, consider disabling the broadcast message functionality if feasible until a vendor fix is released. Conduct regular security awareness training to reduce the risk of social engineering attacks that could lead to privilege escalation. Additionally, isolate Agile Reporter instances within secure network segments and enforce multi-factor authentication to limit unauthorized access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c70b7ef31ef0b5640af

Added to database: 2/25/2026, 9:41:04 PM

Last enriched: 2/26/2026, 5:24:54 AM

Last updated: 2/26/2026, 8:01:58 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats