CVE-2024-45879: n/a
The file upload function in the "QWKalkulation" tool of baltic-it TOPqw Webportal v1.35.287.1 (fixed in version 1.35.291), in /Apps/TOPqw/QWKalkulation/QWKalkulation.aspx, is vulnerable to Cross-Site Scripting (XSS). To exploit the persistent XSS vulnerability, an attacker has to be authenticated to the application that uses the "TOPqw Webportal" as a software. When authenticated, the attacker can persistently place the malicious JavaScript code in the "QWKalkulation" menu.'
AI Analysis
Technical Summary
CVE-2024-45879 is a persistent Cross-Site Scripting (XSS) vulnerability identified in the file upload functionality of the QWKalkulation tool, part of the baltic-it TOPqw Webportal version 1.35.287.1. The vulnerability resides in the /Apps/TOPqw/QWKalkulation/QWKalkulation.aspx endpoint, where insufficient input sanitization allows an authenticated attacker to inject malicious JavaScript code that persists in the application interface, specifically within the QWKalkulation menu. This persistent XSS flaw enables attackers to execute arbitrary scripts in the context of other authenticated users, potentially leading to session hijacking, credential theft, or unauthorized actions within the application. Exploitation requires the attacker to have valid credentials and interact with the application, which limits the attack surface but still poses a significant risk in environments with multiple users or less stringent access controls. The vulnerability was addressed in version 1.35.291 of the software. The CVSS v3.1 base score of 6.1 reflects a medium severity, with attack vector being network-based, low attack complexity, requiring privileges, and user interaction, and impacting confidentiality and integrity but not availability. No public exploits have been reported yet, but the presence of this vulnerability in a business-critical web portal underscores the importance of timely patching and input validation improvements.
Potential Impact
The primary impact of CVE-2024-45879 is on the confidentiality and integrity of user data within the TOPqw Webportal environment. An attacker exploiting this vulnerability can execute persistent malicious scripts that may steal session tokens, manipulate displayed content, or perform unauthorized actions on behalf of other authenticated users. This can lead to unauthorized access to sensitive information, data leakage, and potential compromise of user accounts. Although availability is not directly affected, the trustworthiness of the application is undermined, which can result in reputational damage and operational disruptions. Organizations relying on the affected version of the TOPqw Webportal, especially those in sectors handling sensitive or regulated data, face increased risk of targeted attacks leveraging this vulnerability. The requirement for attacker authentication and user interaction reduces the likelihood of widespread automated exploitation but does not eliminate the threat in environments with multiple users or insider threats.
Mitigation Recommendations
To mitigate CVE-2024-45879, organizations should immediately upgrade the TOPqw Webportal to version 1.35.291 or later, where the vulnerability has been fixed. In addition to patching, implement strict input validation and output encoding on all user-supplied data, especially in file upload components and dynamic web content areas, to prevent injection of malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the web application context. Conduct regular security assessments and code reviews focusing on XSS vulnerabilities, particularly in modules handling file uploads and user-generated content. Limit user privileges to the minimum necessary to reduce the risk posed by authenticated attackers. Monitor application logs for suspicious activities indicative of XSS exploitation attempts. Educate users about the risks of interacting with untrusted content within the application. Finally, consider deploying Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting the TOPqw Webportal.
Affected Countries
Germany, Poland, Lithuania, Latvia, Estonia, Finland, Sweden, Denmark
CVE-2024-45879: n/a
Description
The file upload function in the "QWKalkulation" tool of baltic-it TOPqw Webportal v1.35.287.1 (fixed in version 1.35.291), in /Apps/TOPqw/QWKalkulation/QWKalkulation.aspx, is vulnerable to Cross-Site Scripting (XSS). To exploit the persistent XSS vulnerability, an attacker has to be authenticated to the application that uses the "TOPqw Webportal" as a software. When authenticated, the attacker can persistently place the malicious JavaScript code in the "QWKalkulation" menu.'
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-45879 is a persistent Cross-Site Scripting (XSS) vulnerability identified in the file upload functionality of the QWKalkulation tool, part of the baltic-it TOPqw Webportal version 1.35.287.1. The vulnerability resides in the /Apps/TOPqw/QWKalkulation/QWKalkulation.aspx endpoint, where insufficient input sanitization allows an authenticated attacker to inject malicious JavaScript code that persists in the application interface, specifically within the QWKalkulation menu. This persistent XSS flaw enables attackers to execute arbitrary scripts in the context of other authenticated users, potentially leading to session hijacking, credential theft, or unauthorized actions within the application. Exploitation requires the attacker to have valid credentials and interact with the application, which limits the attack surface but still poses a significant risk in environments with multiple users or less stringent access controls. The vulnerability was addressed in version 1.35.291 of the software. The CVSS v3.1 base score of 6.1 reflects a medium severity, with attack vector being network-based, low attack complexity, requiring privileges, and user interaction, and impacting confidentiality and integrity but not availability. No public exploits have been reported yet, but the presence of this vulnerability in a business-critical web portal underscores the importance of timely patching and input validation improvements.
Potential Impact
The primary impact of CVE-2024-45879 is on the confidentiality and integrity of user data within the TOPqw Webportal environment. An attacker exploiting this vulnerability can execute persistent malicious scripts that may steal session tokens, manipulate displayed content, or perform unauthorized actions on behalf of other authenticated users. This can lead to unauthorized access to sensitive information, data leakage, and potential compromise of user accounts. Although availability is not directly affected, the trustworthiness of the application is undermined, which can result in reputational damage and operational disruptions. Organizations relying on the affected version of the TOPqw Webportal, especially those in sectors handling sensitive or regulated data, face increased risk of targeted attacks leveraging this vulnerability. The requirement for attacker authentication and user interaction reduces the likelihood of widespread automated exploitation but does not eliminate the threat in environments with multiple users or insider threats.
Mitigation Recommendations
To mitigate CVE-2024-45879, organizations should immediately upgrade the TOPqw Webportal to version 1.35.291 or later, where the vulnerability has been fixed. In addition to patching, implement strict input validation and output encoding on all user-supplied data, especially in file upload components and dynamic web content areas, to prevent injection of malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the web application context. Conduct regular security assessments and code reviews focusing on XSS vulnerabilities, particularly in modules handling file uploads and user-generated content. Limit user privileges to the minimum necessary to reduce the risk posed by authenticated attackers. Monitor application logs for suspicious activities indicative of XSS exploitation attempts. Educate users about the risks of interacting with untrusted content within the application. Finally, consider deploying Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting the TOPqw Webportal.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-09-11T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cf3b7ef31ef0b56a6da
Added to database: 2/25/2026, 9:43:15 PM
Last enriched: 2/26/2026, 8:20:46 AM
Last updated: 4/12/2026, 12:20:57 PM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.