Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46409: n/a

0
Medium
VulnerabilityCVE-2024-46409cvecve-2024-46409
Published: Fri Oct 04 2024 (10/04/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A stored cross-site scripting (XSS) vulnerability in SeedDMS v6.0.28 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name parameter in the Calendar page.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:36:15 UTC

Technical Analysis

CVE-2024-46409 is a stored cross-site scripting (XSS) vulnerability identified in SeedDMS version 6.0.28, a document management system widely used for organizing and managing digital documents. The vulnerability arises from insufficient sanitization of user input in the Name parameter on the Calendar page, allowing an attacker with at least limited privileges to inject crafted HTML or JavaScript payloads. When other users view the affected page, the malicious script executes in their browsers within the context of the SeedDMS application. This can lead to unauthorized actions such as session hijacking, theft of sensitive information, or manipulation of displayed content. The vulnerability requires user interaction, as the victim must visit the compromised Calendar page. The CVSS v3.1 base score is 5.4, reflecting a medium severity level due to the network attack vector, low attack complexity, requirement for privileges and user interaction, and partial impact on confidentiality and integrity but no impact on availability. No public exploits or patches are currently reported, indicating the vulnerability is newly disclosed and not yet widely exploited. The CWE-79 classification confirms this is a classic stored XSS issue, emphasizing the need for proper input validation and output encoding in web applications. Given the scope of SeedDMS deployments, this vulnerability poses a moderate risk to organizations relying on this software for document management.

Potential Impact

The impact of CVE-2024-46409 on organizations worldwide can be significant, especially for those using SeedDMS in environments where multiple users access shared calendars and documents. Exploitation can lead to unauthorized disclosure of sensitive information, such as session tokens or user credentials, through script execution in victim browsers. Attackers might also perform actions on behalf of legitimate users, potentially altering data or escalating privileges indirectly. While availability is not affected, the compromise of confidentiality and integrity can undermine trust in the document management system and lead to further attacks within the network. Organizations with high-value intellectual property or sensitive operational data stored in SeedDMS are at increased risk. The requirement for attacker privileges and user interaction somewhat limits the attack surface, but insider threats or compromised accounts could facilitate exploitation. The absence of known exploits in the wild provides a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

To mitigate CVE-2024-46409 effectively, organizations should implement multiple layers of defense beyond generic advice. First, apply any official patches or updates from SeedDMS as soon as they become available. In the absence of patches, administrators should enforce strict input validation and output encoding on the Name parameter in the Calendar page to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. Limit user privileges rigorously, ensuring that only trusted users can modify calendar entries or other inputs susceptible to injection. Conduct regular security training to raise awareness about phishing and social engineering, reducing the likelihood of user interaction with malicious payloads. Monitor application logs for unusual input patterns or repeated attempts to inject scripts. Additionally, consider deploying web application firewalls (WAFs) configured to detect and block XSS payloads targeting SeedDMS. Finally, isolate SeedDMS instances within segmented network zones to contain potential breaches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cfeb7ef31ef0b56ac09

Added to database: 2/25/2026, 9:43:26 PM

Last enriched: 2/26/2026, 8:36:15 AM

Last updated: 4/12/2026, 7:54:59 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses