Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48623: n/a

0
Medium
VulnerabilityCVE-2024-48623cvecve-2024-48623
Published: Tue Oct 15 2024 (10/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-48623 is a reflected Cross Site Scripting (XSS) vulnerability found in DomainMOD versions below 4. 12. 0, specifically in the queue\index. php file. The vulnerability arises from improper sanitization of the list_id and domain_id parameters in GET requests, allowing attackers to inject malicious scripts. Exploitation requires low privileges and no user interaction, but an attacker must have local access to the application. The vulnerability can lead to partial compromise of confidentiality, integrity, and availability of the affected system. No known exploits are currently reported in the wild. The CVSS 3. 1 base score is 5.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:10:35 UTC

Technical Analysis

CVE-2024-48623 is a reflected Cross Site Scripting (XSS) vulnerability identified in the DomainMOD application, specifically in versions prior to 4.12.0. The vulnerability exists in the queue\index.php script, where the GET parameters list_id and domain_id are not properly sanitized or encoded before being reflected in the HTTP response. This lack of input validation allows an attacker to craft a malicious URL containing executable JavaScript code within these parameters. When a victim accesses this crafted URL, the injected script executes in the context of the victim's browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability requires the attacker to have at least local privileges (AV:L) and low attack complexity (AC:L), with no user interaction needed (UI:N). The scope is unchanged (S:U), and the impact affects confidentiality, integrity, and availability to a limited extent (C:L/I:L/A:L). Although no public exploits have been reported yet, the vulnerability is classified under CWE-79, a common and well-understood web security weakness. The reflected XSS can be leveraged in phishing campaigns or to escalate attacks within trusted networks. DomainMOD is a domain management tool used by organizations managing domain portfolios, making this vulnerability relevant to those environments. The absence of an official patch at the time of disclosure necessitates immediate mitigation efforts to reduce risk.

Potential Impact

The impact of CVE-2024-48623 on organizations can be significant, particularly for those relying on DomainMOD for domain portfolio management. Successful exploitation of this reflected XSS vulnerability can lead to the execution of arbitrary scripts in the context of authenticated users, potentially resulting in session hijacking, theft of sensitive information such as credentials or tokens, and unauthorized actions within the application. This can compromise the confidentiality and integrity of domain management data, which is critical for organizations that depend on accurate and secure domain administration. Additionally, the vulnerability could be used as a stepping stone for further attacks within the internal network, especially if DomainMOD is accessible only internally. Although the availability impact is limited, disruption caused by malicious scripts or exploitation attempts could degrade service reliability. The medium CVSS score reflects a moderate risk, but the ease of exploitation and potential for abuse in targeted attacks means organizations should treat this vulnerability seriously. The lack of known exploits in the wild suggests a window of opportunity for defenders to remediate before widespread attacks occur.

Mitigation Recommendations

To mitigate CVE-2024-48623, organizations should implement the following specific measures: 1) Immediately restrict access to the DomainMOD queue\index.php page to trusted users and networks, ideally limiting it to internal IP ranges or VPN access only. 2) Apply strict input validation and output encoding on the list_id and domain_id GET parameters to neutralize any injected scripts. This can be done by sanitizing inputs to allow only expected numeric or alphanumeric values and encoding outputs to prevent script execution. 3) Monitor web server logs for suspicious requests containing unusual or script-like payloads in these parameters. 4) Educate users about the risks of clicking on untrusted links related to domain management tools. 5) Stay alert for official patches or updates from DomainMOD developers and apply them promptly once released. 6) Consider deploying Web Application Firewalls (WAFs) with rules to detect and block reflected XSS attempts targeting these parameters. 7) Conduct internal penetration testing to verify the effectiveness of mitigations and identify any residual vulnerabilities. These steps go beyond generic advice by focusing on the specific vulnerable parameters and access controls relevant to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b74b7ef31ef0b555991

Added to database: 2/25/2026, 9:36:52 PM

Last enriched: 2/26/2026, 12:10:35 AM

Last updated: 2/26/2026, 7:11:50 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats