Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42902: n/a

0
High
VulnerabilityCVE-2024-42902cvecve-2024-42902
Published: Tue Sep 03 2024 (09/03/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in the js_localize.php function of LimeSurvey v6.6.2 and before allows attackers to execute arbitrary code via injecting a crafted payload into the lng parameter of the js_localize.php function

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:19:49 UTC

Technical Analysis

CVE-2024-42902 is a remote code execution (RCE) vulnerability identified in the js_localize.php function of LimeSurvey version 6.6.2 and earlier. The vulnerability stems from improper input validation and sanitization of the 'lng' parameter, which is used for localization purposes. An attacker with at least limited privileges (PR:L in CVSS) can craft a malicious payload injected into this parameter, leading to arbitrary code execution on the server hosting LimeSurvey. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code), indicating that user-supplied input is executed as code without sufficient validation. The CVSS v3.1 base score is 8.8, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker can remotely exploit the vulnerability without user interaction, potentially gaining full control over the affected system. No public exploits have been reported yet, but the vulnerability's nature and scoring suggest it could be weaponized quickly. The lack of patch links in the provided data indicates that either patches are pending or not yet publicly documented, emphasizing the need for vigilance and interim mitigations. LimeSurvey is an open-source survey tool widely used by organizations for data collection, making this vulnerability particularly concerning for entities relying on it for sensitive or critical information gathering.

Potential Impact

The impact of CVE-2024-42902 is severe for organizations using vulnerable versions of LimeSurvey. Successful exploitation allows attackers to execute arbitrary code remotely, potentially leading to full system compromise. This can result in unauthorized access to sensitive survey data, manipulation or deletion of collected information, disruption of survey services, and use of the compromised server as a pivot point for further attacks within the network. The high confidentiality, integrity, and availability impacts mean that organizations may suffer data breaches, loss of trust, regulatory penalties, and operational downtime. Given LimeSurvey's role in collecting and managing data, sectors such as government, healthcare, education, and market research are particularly vulnerable. The ease of exploitation and lack of required user interaction increase the likelihood of automated attacks and wormable scenarios if exploited in the wild.

Mitigation Recommendations

1. Immediately upgrade LimeSurvey to the latest version once an official patch addressing CVE-2024-42902 is released. 2. Until patches are available, restrict access to the js_localize.php endpoint via web application firewalls (WAFs) or network access controls, limiting it to trusted IP addresses or internal networks only. 3. Implement input validation and sanitization at the web server or application firewall level to block suspicious payloads targeting the 'lng' parameter. 4. Monitor web server logs for unusual or repeated requests to js_localize.php containing suspicious or malformed 'lng' parameters. 5. Employ runtime application self-protection (RASP) tools if available to detect and block code injection attempts in real time. 6. Conduct thorough security audits and penetration testing focusing on LimeSurvey installations to identify any signs of compromise or exploitation attempts. 7. Educate system administrators and developers about this vulnerability to ensure prompt response and remediation. 8. Consider isolating LimeSurvey instances in segmented network zones to limit lateral movement in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cd0b7ef31ef0b569469

Added to database: 2/25/2026, 9:42:40 PM

Last enriched: 2/28/2026, 6:19:49 AM

Last updated: 4/12/2026, 6:21:50 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses