Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-41519: n/a

0
Medium
VulnerabilityCVE-2024-41519cvecve-2024-41519
Published: Fri Aug 02 2024 (08/02/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-41519 is a medium severity Cross Site Scripting (XSS) vulnerability affecting Feripro versions up to 2. 2. 3. The vulnerability exists in the "/admin/programm/<program_id>/zuordnung/veranstaltungen/<event_id>" endpoint via the "school" input field. Exploitation requires authenticated access and user interaction, allowing an attacker to inject malicious scripts that can compromise confidentiality and integrity. There are no known exploits in the wild yet, and no patches have been published. The vulnerability has a CVSS score of 5. 4, indicating moderate risk. Organizations using Feripro in administrative roles should prioritize input validation and sanitization to mitigate this risk. Countries with significant Feripro usage, especially in education or event management sectors, are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 07:07:58 UTC

Technical Analysis

CVE-2024-41519 identifies a Cross Site Scripting (XSS) vulnerability in Feripro software versions up to 2.2.3. The vulnerability is located in the administrative URL path "/admin/programm/<program_id>/zuordnung/veranstaltungen/<event_id>", specifically through the "school" input field. This input field does not properly sanitize user-supplied data, allowing an attacker with authenticated access to inject malicious JavaScript code. When a victim user interacts with the affected page, the injected script can execute in their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions within the application. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) indicates that the attack can be launched remotely over the network with low complexity, requires privileges (authenticated user), and user interaction is necessary. The scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality and integrity is low but non-negligible, while availability is not affected. No known public exploits or patches are currently available, highlighting the need for proactive mitigation. The vulnerability is classified under CWE-79, a common web application security weakness related to improper input validation and output encoding.

Potential Impact

The primary impact of CVE-2024-41519 is the potential compromise of user confidentiality and integrity within the Feripro application. Successful exploitation can allow attackers to execute arbitrary scripts in the context of authenticated users, leading to session hijacking, theft of sensitive information, or unauthorized actions such as privilege escalation or data manipulation. Although availability is not impacted, the breach of trust and data integrity can disrupt organizational workflows, especially in environments where Feripro is used for managing programs and events. The requirement for authenticated access and user interaction limits the attack surface but does not eliminate risk, particularly in organizations with many users or weak internal controls. The absence of known exploits reduces immediate threat but also means defenders must be vigilant for emerging attacks. Organizations relying on Feripro for administrative functions could face reputational damage and compliance issues if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2024-41519, organizations should implement strict input validation and output encoding on the "school" input field within the affected URL path to prevent injection of malicious scripts. Employing a robust Content Security Policy (CSP) can help restrict the execution of unauthorized scripts. Web Application Firewalls (WAFs) should be configured to detect and block suspicious payloads targeting this endpoint. Since no official patch is currently available, administrators should limit access to the affected administrative interface to trusted users and networks, enforce strong authentication mechanisms, and monitor logs for unusual activity indicative of exploitation attempts. User education about phishing and social engineering risks can reduce the likelihood of successful user interaction exploitation. Regular security assessments and penetration testing focused on input validation can help identify and remediate similar vulnerabilities proactively. Finally, maintain close communication with the vendor for updates and patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cbbb7ef31ef0b5687e0

Added to database: 2/25/2026, 9:42:19 PM

Last enriched: 2/26/2026, 7:07:58 AM

Last updated: 2/26/2026, 8:03:36 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats