Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4406: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Xiaomi Pro 13

0
High
VulnerabilityCVE-2024-4406cvecve-2024-4406cwe-79
Published: Thu May 02 2024 (05/02/2024, 15:02:49 UTC)
Source: CVE Database V5
Vendor/Project: Xiaomi
Product: Pro 13

Description

Xiaomi Pro 13 GetApps integral-dialog-page Cross-Site Scripting Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xiaomi Pro 13 smartphones. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the integral-dialog-page.html file. When parsing the integralInfo parameter, the process does not properly sanitize user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22332.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 22:11:01 UTC

Technical Analysis

CVE-2024-4406 is a cross-site scripting (CWE-79) vulnerability identified in the Xiaomi Pro 13 smartphone, specifically affecting the GetApps integral-dialog-page.html component. The vulnerability arises from improper neutralization of user-supplied input in the integralInfo parameter, which is parsed without adequate sanitization. This flaw allows an attacker to inject arbitrary JavaScript code that executes within the security context of the current user. Exploitation requires the victim to interact with malicious content, such as visiting a crafted webpage or opening a malicious file, which triggers the vulnerable code path. Successful exploitation can lead to remote code execution, enabling attackers to steal sensitive information, manipulate device settings, or perform actions on behalf of the user. The vulnerability affects Xiaomi Pro 13 devices running firmware version 14.0.5.0. The CVSS v3.0 base score is 8.8, indicating high severity due to network attack vector, low attack complexity, no privileges required, but requiring user interaction, and resulting in high confidentiality, integrity, and availability impacts. Although no exploits are currently known in the wild, the vulnerability was assigned ZDI-CAN-22332 and publicly disclosed on May 2, 2024. The lack of an official patch at the time of disclosure increases the urgency for mitigation. This vulnerability highlights the risks associated with insufficient input validation in web components embedded within mobile applications.

Potential Impact

The impact of CVE-2024-4406 is significant for users and organizations relying on Xiaomi Pro 13 smartphones. Successful exploitation can lead to remote code execution, compromising the confidentiality, integrity, and availability of the device. Attackers can steal sensitive personal or corporate data, hijack user sessions, install persistent malware, or disrupt device functionality. For enterprises with BYOD policies or those issuing Xiaomi Pro 13 devices, this vulnerability poses a risk of lateral movement within corporate networks or data leakage. The requirement for user interaction limits mass exploitation but targeted phishing or social engineering attacks could be effective. Given the high CVSS score, the vulnerability represents a critical security risk until patched. The absence of known exploits in the wild suggests limited current exploitation but also means defenses should be proactive. The vulnerability could also undermine user trust in Xiaomi devices and impact the broader mobile ecosystem if exploited at scale.

Mitigation Recommendations

To mitigate CVE-2024-4406, affected users should immediately avoid interacting with untrusted links or files that could trigger the vulnerability. Xiaomi should prioritize releasing a security patch that properly sanitizes the integralInfo parameter in the integral-dialog-page.html component. Until a patch is available, organizations should implement mobile device management (MDM) policies to restrict installation of untrusted applications and enforce safe browsing practices. Network-level protections such as web filtering and anti-phishing solutions can reduce exposure to malicious content. Users should keep their devices updated with the latest firmware and security updates from Xiaomi. Security teams should monitor for indicators of compromise related to this vulnerability and educate users about the risks of social engineering attacks. Additionally, sandboxing or restricting the privileges of the GetApps component could limit the impact of exploitation. Regular security assessments of mobile applications and embedded web components are recommended to prevent similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-05-02T00:17:59.826Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6b8cb7ef31ef0b556804

Added to database: 2/25/2026, 9:37:16 PM

Last enriched: 2/27/2026, 10:11:01 PM

Last updated: 4/12/2026, 5:32:10 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses