CVE-2024-38972: n/a
CVE-2024-38972 is a medium severity cross-site scripting (XSS) vulnerability in NetBox version 4. 0. 3. It allows attackers to inject arbitrary web scripts or HTML via the Name parameter on the /dcim/power-ports/add/ endpoint. Exploitation requires user interaction but no authentication, and the vulnerability affects confidentiality and integrity with no direct impact on availability. There are no known exploits in the wild currently, and no official patches have been released yet. The vulnerability stems from improper input sanitization leading to CWE-79. Organizations using NetBox 4. 0. 3 should be cautious and implement mitigations to prevent exploitation.
AI Analysis
Technical Summary
CVE-2024-38972 is a cross-site scripting (XSS) vulnerability identified in NetBox version 4.0.3, a popular open-source IP address management (IPAM) and data center infrastructure management (DCIM) tool. The vulnerability exists in the handling of the Name parameter on the /dcim/power-ports/add/ web endpoint. An attacker can craft a malicious payload that, when injected into this parameter, results in the execution of arbitrary JavaScript or HTML code within the context of the victim's browser session. This type of vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 6.1, reflecting a medium severity level. The vector indicates that the attack can be performed remotely (AV:N) with low attack complexity (AC:L), requires no privileges (PR:N), but does require user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the security scope of the vulnerable component. The impact affects confidentiality and integrity (C:L/I:L) but not availability (A:N). No known exploits have been reported in the wild, and no official patches have been published at the time of disclosure. The vulnerability could be leveraged by attackers to steal session cookies, perform actions on behalf of authenticated users, or conduct phishing attacks by injecting malicious content into the web interface. Given NetBox’s role in managing critical network infrastructure data, exploitation could lead to significant operational risks.
Potential Impact
The impact of CVE-2024-38972 is primarily on the confidentiality and integrity of data within the NetBox application. Successful exploitation could allow attackers to execute arbitrary scripts in the context of authenticated users, potentially leading to session hijacking, unauthorized actions, or the injection of misleading information. Since NetBox is widely used for managing IP addresses and data center infrastructure, such attacks could disrupt network management processes or expose sensitive network topology and configuration data. Although availability is not directly affected, the compromise of integrity and confidentiality could indirectly impact operational stability and trust in the management system. Organizations relying on NetBox for critical infrastructure management, especially those with large-scale deployments, face increased risk of targeted attacks aiming to leverage this vulnerability for lateral movement or reconnaissance within their networks.
Mitigation Recommendations
To mitigate CVE-2024-38972, organizations should implement the following specific measures: 1) Apply any official patches or updates from NetBox as soon as they become available. 2) In the absence of patches, implement web application firewall (WAF) rules to detect and block malicious payloads targeting the /dcim/power-ports/add/ endpoint, focusing on suspicious input in the Name parameter. 3) Enforce strict input validation and output encoding on all user-supplied data within the application, particularly for the affected parameter, to prevent script injection. 4) Limit user permissions to only those necessary, reducing the number of users who can access the vulnerable functionality. 5) Educate users about the risks of interacting with untrusted links or content within the NetBox interface to reduce the likelihood of successful user interaction exploitation. 6) Monitor application logs for unusual activity or repeated attempts to inject scripts. 7) Consider deploying Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. These targeted mitigations go beyond generic advice by focusing on the specific vulnerable endpoint and parameter, user interaction requirements, and the operational context of NetBox.
Affected Countries
United States, Germany, United Kingdom, France, Netherlands, Australia, Canada, Japan, South Korea, India
CVE-2024-38972: n/a
Description
CVE-2024-38972 is a medium severity cross-site scripting (XSS) vulnerability in NetBox version 4. 0. 3. It allows attackers to inject arbitrary web scripts or HTML via the Name parameter on the /dcim/power-ports/add/ endpoint. Exploitation requires user interaction but no authentication, and the vulnerability affects confidentiality and integrity with no direct impact on availability. There are no known exploits in the wild currently, and no official patches have been released yet. The vulnerability stems from improper input sanitization leading to CWE-79. Organizations using NetBox 4. 0. 3 should be cautious and implement mitigations to prevent exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2024-38972 is a cross-site scripting (XSS) vulnerability identified in NetBox version 4.0.3, a popular open-source IP address management (IPAM) and data center infrastructure management (DCIM) tool. The vulnerability exists in the handling of the Name parameter on the /dcim/power-ports/add/ web endpoint. An attacker can craft a malicious payload that, when injected into this parameter, results in the execution of arbitrary JavaScript or HTML code within the context of the victim's browser session. This type of vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 6.1, reflecting a medium severity level. The vector indicates that the attack can be performed remotely (AV:N) with low attack complexity (AC:L), requires no privileges (PR:N), but does require user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the security scope of the vulnerable component. The impact affects confidentiality and integrity (C:L/I:L) but not availability (A:N). No known exploits have been reported in the wild, and no official patches have been published at the time of disclosure. The vulnerability could be leveraged by attackers to steal session cookies, perform actions on behalf of authenticated users, or conduct phishing attacks by injecting malicious content into the web interface. Given NetBox’s role in managing critical network infrastructure data, exploitation could lead to significant operational risks.
Potential Impact
The impact of CVE-2024-38972 is primarily on the confidentiality and integrity of data within the NetBox application. Successful exploitation could allow attackers to execute arbitrary scripts in the context of authenticated users, potentially leading to session hijacking, unauthorized actions, or the injection of misleading information. Since NetBox is widely used for managing IP addresses and data center infrastructure, such attacks could disrupt network management processes or expose sensitive network topology and configuration data. Although availability is not directly affected, the compromise of integrity and confidentiality could indirectly impact operational stability and trust in the management system. Organizations relying on NetBox for critical infrastructure management, especially those with large-scale deployments, face increased risk of targeted attacks aiming to leverage this vulnerability for lateral movement or reconnaissance within their networks.
Mitigation Recommendations
To mitigate CVE-2024-38972, organizations should implement the following specific measures: 1) Apply any official patches or updates from NetBox as soon as they become available. 2) In the absence of patches, implement web application firewall (WAF) rules to detect and block malicious payloads targeting the /dcim/power-ports/add/ endpoint, focusing on suspicious input in the Name parameter. 3) Enforce strict input validation and output encoding on all user-supplied data within the application, particularly for the affected parameter, to prevent script injection. 4) Limit user permissions to only those necessary, reducing the number of users who can access the vulnerable functionality. 5) Educate users about the risks of interacting with untrusted links or content within the NetBox interface to reduce the likelihood of successful user interaction exploitation. 6) Monitor application logs for unusual activity or repeated attempts to inject scripts. 7) Consider deploying Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. These targeted mitigations go beyond generic advice by focusing on the specific vulnerable endpoint and parameter, user interaction requirements, and the operational context of NetBox.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-06-21T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c7eb7ef31ef0b56501b
Added to database: 2/25/2026, 9:41:18 PM
Last enriched: 2/26/2026, 5:41:32 AM
Last updated: 2/26/2026, 6:11:20 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.