Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45962: n/a

0
Medium
VulnerabilityCVE-2024-45962cvecve-2024-45962
Published: Wed Oct 02 2024 (10/02/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

October 3.6.30 allows an authenticated admin account to upload a PDF file containing malicious JavaScript into the target system. If the file is accessed through the website, it could lead to a Cross-Site Scripting (XSS) attack or execute arbitrary code via a crafted JavaScript to the target.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:23:29 UTC

Technical Analysis

CVE-2024-45962 is a vulnerability identified in October CMS version 3.6.30 that allows an authenticated administrator to upload a PDF file containing embedded malicious JavaScript code. This malicious script can be executed when the PDF is accessed through the website, potentially leading to a Cross-Site Scripting (XSS) attack or arbitrary code execution within the victim’s browser context. The vulnerability stems from insufficient sanitization or validation of uploaded PDF content, allowing JavaScript embedded in PDFs to run unchecked. The attack requires an authenticated admin account to upload the malicious file, and user interaction is necessary to trigger the payload by viewing the PDF on the site. The vulnerability is classified under CWE-79, which relates to improper neutralization of input leading to XSS. Although the CVSS score is 4.7 (medium), the scope is significant because the vulnerability can lead to session hijacking, defacement, or further exploitation via the victim’s browser. No public exploits or patches are currently available, indicating this is a newly disclosed issue. The vulnerability affects the confidentiality and integrity of user sessions and data but does not directly impact availability. The attack vector is network-based, with low attack complexity but requiring privileges and user interaction. The vulnerability’s scope is limited to installations of October CMS that allow admin PDF uploads and serve these files to users.

Potential Impact

The primary impact of CVE-2024-45962 is the potential compromise of user sessions and data confidentiality through Cross-Site Scripting attacks. If exploited, attackers could execute arbitrary JavaScript in the context of users visiting the affected site, potentially stealing cookies, session tokens, or performing actions on behalf of users. This could lead to unauthorized access, data leakage, or defacement of the website. Since exploitation requires an authenticated admin to upload the malicious PDF, insider threats or compromised admin accounts pose the greatest risk. The vulnerability could also be leveraged in targeted attacks against organizations relying on October CMS for content management, especially those with sensitive user data or critical business functions. The lack of a patch increases exposure time, and the ability to execute arbitrary code via JavaScript could facilitate further attacks such as phishing or malware delivery. However, the requirement for user interaction and admin privileges limits the widespread automated exploitation potential. Organizations worldwide using October CMS may face reputational damage, regulatory penalties, and operational disruptions if this vulnerability is exploited.

Mitigation Recommendations

Organizations should immediately review and restrict the ability of admin users to upload PDF files or any files containing executable content. Implement strict file type validation and content sanitization on all uploads, ensuring that PDFs cannot contain active JavaScript or other executable code. Employ Content Security Policy (CSP) headers to limit the execution of inline scripts and reduce the impact of XSS attacks. Monitor admin account activities for unusual upload behavior and enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of compromised admin credentials. Until a patch is released, consider disabling PDF uploads or restricting access to trusted administrators only. Regularly audit and update October CMS installations and subscribe to vendor advisories for timely patching. Additionally, educate users and administrators about the risks of opening untrusted files and implement web application firewalls (WAFs) to detect and block suspicious payloads. Finally, conduct penetration testing focused on file upload functionalities to identify similar weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cf5b7ef31ef0b56a7fa

Added to database: 2/25/2026, 9:43:17 PM

Last enriched: 2/26/2026, 8:23:29 AM

Last updated: 4/12/2026, 7:26:20 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses