Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-49672: Cross-Site Request Forgery (CSRF) in giffordcheung Google Docs RSVP

0
Unknown
VulnerabilityCVE-2024-49672cvecve-2024-49672
Published: Tue Oct 29 2024 (10/29/2024, 11:04:02 UTC)
Source: CVE Database V5
Vendor/Project: giffordcheung
Product: Google Docs RSVP

Description

Cross-Site Request Forgery (CSRF) vulnerability in giffordcheung Google Docs RSVP google-docs-rsvp-guestlist allows Stored XSS.This issue affects Google Docs RSVP: from n/a through <= 2.0.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 11:28:59 UTC

Technical Analysis

CVE-2024-49672 identifies a security vulnerability in the Google Docs RSVP plugin developed by giffordcheung, specifically versions up to and including 2.0.1. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that enables attackers to trick authenticated users into submitting unwanted requests to the application. This CSRF vulnerability leads to Stored Cross-Site Scripting (XSS), where malicious scripts injected by the attacker are permanently stored within the application’s data, such as guest lists or RSVP entries. When other users access the infected data, the malicious scripts execute in their browsers, potentially stealing session tokens, manipulating content, or performing actions on behalf of the user. The combination of CSRF and stored XSS significantly increases the attack surface, as CSRF can be used to inject the persistent XSS payload without the victim’s explicit consent. The vulnerability affects the Google Docs RSVP plugin, a tool that integrates with Google Docs to manage event guest lists and RSVPs, widely used in organizational and event management contexts. No CVSS score has been assigned yet, and no official patches or exploit reports are currently available, indicating the vulnerability is newly disclosed. The vulnerability was published on October 29, 2024, and was reserved earlier that month. The absence of patches means users of the plugin remain exposed until mitigations or updates are released.

Potential Impact

The exploitation of this vulnerability can have severe consequences for organizations using the Google Docs RSVP plugin. Attackers can leverage CSRF to inject stored XSS payloads, leading to persistent malicious scripts executing in the context of users’ browsers. This can result in theft of authentication tokens, unauthorized actions performed on behalf of users, data manipulation, and potential spread of malware. The confidentiality of sensitive event and guest information can be compromised, while the integrity of RSVP data can be altered, undermining trust and operational reliability. Availability could be affected if attackers use the vulnerability to disrupt service or cause application errors. Organizations relying on this plugin for event management or collaboration may face reputational damage, data breaches, and compliance issues. Since the vulnerability requires the victim to be authenticated but no additional user interaction beyond visiting a malicious page is needed, the attack vector is relatively easy to exploit in environments where users are logged in. The lack of known exploits in the wild provides a window for proactive mitigation, but the risk remains significant given the nature of the vulnerability.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately review their use of the Google Docs RSVP plugin and consider disabling it until a patched version is available. Implementing strict anti-CSRF tokens and validating the origin of requests within the plugin’s codebase is critical to prevent unauthorized request forgery. Input sanitization and output encoding should be enforced rigorously to eliminate stored XSS risks. Administrators should monitor event guest lists and related data for suspicious or unexpected entries that could indicate exploitation attempts. Employing Content Security Policy (CSP) headers can help reduce the impact of XSS by restricting script execution sources. User education about phishing and suspicious links can reduce the likelihood of users visiting malicious pages that trigger CSRF attacks. Regularly checking for updates from the plugin developer and applying patches promptly once available is essential. Additionally, organizations should audit their Google Workspace environment for any unusual activity related to the plugin and consider implementing multi-factor authentication to limit session hijacking risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-10-17T09:52:02.527Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd74e2e6bfc5ba1df0187e

Added to database: 4/1/2026, 7:41:22 PM

Last enriched: 4/2/2026, 11:28:59 AM

Last updated: 4/6/2026, 9:29:45 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses