Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50534: Cross-Site Request Forgery (CSRF) in techdabang World Prayer Time

0
Unknown
VulnerabilityCVE-2024-50534cvecve-2024-50534
Published: Tue Nov 19 2024 (11/19/2024, 16:32:31 UTC)
Source: CVE Database V5
Vendor/Project: techdabang
Product: World Prayer Time

Description

Cross-Site Request Forgery (CSRF) vulnerability in techdabang World Prayer Time world-prayer-time allows Stored XSS.This issue affects World Prayer Time: from n/a through <= 2.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 07:38:56 UTC

Technical Analysis

CVE-2024-50534 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the techdabang World Prayer Time application, specifically affecting versions up to 2.0. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted requests to a web application, which can lead to unauthorized actions being performed without the user's consent. In this case, the CSRF vulnerability is linked with a Stored Cross-Site Scripting (XSS) issue, meaning that an attacker can inject malicious scripts that are stored persistently within the application’s data. When other users access the affected pages, these scripts execute in their browsers, potentially stealing session cookies, credentials, or performing actions on their behalf. The vulnerability arises from insufficient validation of user requests and lack of anti-CSRF protections such as tokens or same-site cookie attributes. The World Prayer Time application, designed to provide prayer times globally, may store user input or configuration data that is vulnerable to script injection. Although no public exploits have been reported, the combination of CSRF and stored XSS significantly increases the attack surface and potential impact. The absence of a CVSS score requires an assessment based on the nature of the vulnerability, which affects confidentiality, integrity, and possibly availability if exploited to conduct further attacks. The vulnerability is particularly concerning because it does not require user interaction beyond visiting a malicious page, and it can affect all authenticated users of the application. The lack of patches or official fixes at the time of publication means users must implement interim mitigations.

Potential Impact

The impact of CVE-2024-50534 can be significant for organizations and users relying on the techdabang World Prayer Time application. Successful exploitation allows attackers to perform unauthorized actions on behalf of authenticated users, potentially leading to account compromise, data theft, or manipulation of stored data. The stored XSS component enables persistent malicious script execution, which can be used to hijack user sessions, spread malware, or conduct phishing attacks within the trusted application context. This undermines user trust and can lead to broader security breaches if the application integrates with other systems or shares sensitive user information. Although the application targets a specific niche, organizations or communities using it for religious or cultural purposes may face reputational damage and operational disruption. The lack of known exploits currently limits immediate widespread damage, but the vulnerability’s presence in a publicly known CVE database increases the risk of future exploitation attempts. Without mitigation, attackers can exploit this vulnerability remotely without requiring user interaction beyond visiting a crafted URL, increasing the ease of exploitation and potential scale of impact.

Mitigation Recommendations

To mitigate CVE-2024-50534, organizations should implement robust anti-CSRF protections, including the use of unique, unpredictable CSRF tokens for all state-changing requests. Enforcing the SameSite attribute on cookies can also reduce CSRF risks by restricting cross-origin requests. Input validation and output encoding must be strengthened to prevent stored XSS by sanitizing all user-supplied data before storage and rendering. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts. Regularly audit and update the World Prayer Time application to the latest version once patches become available. In the absence of official patches, consider deploying web application firewalls (WAFs) with rules to detect and block CSRF and XSS attack patterns. Educate users about the risks of clicking on suspicious links and encourage the use of browsers with built-in anti-CSRF and anti-XSS protections. Monitor application logs for unusual activity indicative of exploitation attempts. Finally, isolate the application environment where possible to limit the impact of a successful attack.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-10-24T07:27:40.366Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7501e6bfc5ba1df022ec

Added to database: 4/1/2026, 7:41:53 PM

Last enriched: 4/2/2026, 7:38:56 AM

Last updated: 4/4/2026, 7:14:04 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses