Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40733: n/a

0
Medium
VulnerabilityCVE-2024-40733cvecve-2024-40733
Published: Tue Jul 09 2024 (07/09/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/front-ports/{id}/edit/.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:30:13 UTC

Technical Analysis

CVE-2024-40733 is a cross-site scripting (XSS) vulnerability identified in NetBox version 4.0.3, a popular open-source IP address management (IPAM) and data center infrastructure management (DCIM) tool. The vulnerability exists due to insufficient sanitization of user-supplied input in the Name parameter at the /dcim/front-ports/{id}/edit/ endpoint. An attacker can craft a malicious payload containing executable JavaScript or HTML and inject it into this parameter. When a legitimate user accesses the affected page, the malicious script executes in their browser context, potentially allowing the attacker to steal session cookies, perform actions on behalf of the user, or deface the web interface. The CVSS v3.1 base score is 6.1, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, but requiring user interaction. The scope is changed, indicating the vulnerability affects components beyond the initially vulnerable module. No known exploits have been reported in the wild, and no official patches have been published as of the vulnerability disclosure date. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation leading to XSS. Given NetBox’s role in managing critical network infrastructure data, exploitation could lead to unauthorized access or manipulation of sensitive network configuration information.

Potential Impact

The primary impact of CVE-2024-40733 is on confidentiality and integrity of data within NetBox environments. Successful exploitation could allow attackers to hijack user sessions, steal sensitive network management information, or perform unauthorized actions within the application context. While availability is not directly affected, the trustworthiness of the data and user interactions can be compromised, potentially leading to misconfigurations or further attacks on the network infrastructure. Organizations relying on NetBox for critical network and data center management could face increased risk of lateral movement or data leakage. The requirement for user interaction somewhat limits the attack vector, but phishing or social engineering could facilitate exploitation. The absence of authentication requirements increases the attack surface, allowing unauthenticated attackers to attempt exploitation. Overall, the vulnerability could undermine operational security and network management integrity if left unmitigated.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict input validation and output encoding on the Name parameter within the /dcim/front-ports/{id}/edit/ endpoint to prevent script injection. Employing a web application firewall (WAF) with rules to detect and block XSS payloads targeting this endpoint can provide an additional layer of defense. Restrict access to the NetBox management interface to trusted networks and authenticated users only, minimizing exposure to unauthenticated attackers. Educate users to recognize and avoid interacting with suspicious links or payloads that could trigger the XSS vulnerability. Monitor logs and user activity for unusual behavior indicative of exploitation attempts. Consider deploying Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser context. Regularly review and update security controls as patches become available, and apply them promptly once released by the NetBox maintainers.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cb1b7ef31ef0b568127

Added to database: 2/25/2026, 9:42:09 PM

Last enriched: 2/28/2026, 5:30:13 AM

Last updated: 4/12/2026, 5:07:40 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses