Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39090: n/a

0
Medium
VulnerabilityCVE-2024-39090cvecve-2024-39090
Published: Thu Jul 18 2024 (07/18/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

The PHPGurukul Online Shopping Portal Project version 2.0 contains a vulnerability that allows Cross-Site Request Forgery (CSRF) to lead to Stored Cross-Site Scripting (XSS). An attacker can exploit this vulnerability to execute arbitrary JavaScript code in the context of a user's session, potentially leading to account takeover.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 05:47:22 UTC

Technical Analysis

CVE-2024-39090 identifies a security vulnerability in the PHPGurukul Online Shopping Portal Project version 2.0, where a Cross-Site Request Forgery (CSRF) vulnerability leads to Stored Cross-Site Scripting (XSS). The CSRF flaw allows an attacker to trick an authenticated user into submitting a malicious request unknowingly. This request can inject persistent malicious JavaScript code into the application’s data store, which is then executed in the context of other users’ browsers when they access the affected pages. The exploitation does not require prior authentication but does require the victim to interact with a crafted link or page. The vulnerability impacts confidentiality and integrity by enabling attackers to hijack user sessions, steal sensitive information, or perform unauthorized actions on behalf of the user. The CVSS 3.1 base score of 6.1 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, user interaction required, and a scope change indicating that the vulnerability affects resources beyond the initially vulnerable component. No patches or known exploits have been reported yet, but the risk remains significant due to the potential for account takeover and data theft. The vulnerability is classified under CWE-352 (Cross-Site Request Forgery).

Potential Impact

The primary impact of CVE-2024-39090 is the potential for attackers to hijack user sessions and perform unauthorized actions within the PHPGurukul Online Shopping Portal. This can lead to account takeover, unauthorized purchases, theft of personal and payment information, and reputational damage to affected organizations. Since the vulnerability allows stored XSS, it can also facilitate further attacks such as cookie theft, keylogging, or spreading malware to other users. The compromise of user accounts can have cascading effects, including financial loss and erosion of customer trust. Organizations relying on this software for e-commerce operations face risks to their business continuity and compliance with data protection regulations. Although no known exploits are currently active, the ease of exploitation via social engineering and the widespread use of online shopping portals increase the threat potential globally.

Mitigation Recommendations

To mitigate CVE-2024-39090, organizations should implement robust anti-CSRF protections such as synchronizer tokens or double-submit cookies to ensure that state-changing requests are legitimate. Input validation and output encoding must be enforced rigorously to prevent injection of malicious scripts into stored data. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Regularly audit and sanitize user-generated content before storage and display. Educate users about the risks of clicking on suspicious links and encourage the use of updated browsers with security features. Monitor logs for unusual activities indicative of CSRF or XSS exploitation attempts. Since no official patch is currently available, consider temporary workarounds such as disabling vulnerable features or restricting access to trusted users until a fix is released. Engage with the software vendor or community to track patch availability and apply updates promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c81b7ef31ef0b565b70

Added to database: 2/25/2026, 9:41:21 PM

Last enriched: 2/26/2026, 5:47:22 AM

Last updated: 4/12/2026, 3:39:00 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses