Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50803: n/a

0
Medium
VulnerabilityCVE-2024-50803cvecve-2024-50803
Published: Tue Nov 19 2024 (11/19/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-50803 is a medium-severity Cross Site Scripting (XSS) vulnerability in the mediapool feature of Redaxo Core CMS version 5. 17. 1. This vulnerability allows a remote attacker with limited privileges and requiring user interaction to escalate privileges by exploiting a reflected or stored XSS flaw. The vulnerability impacts confidentiality and integrity but does not affect availability. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability requires an attacker to have some level of privileges and to trick a user into interacting with a crafted payload. Organizations using Redaxo CMS 5. 17. 1 should prioritize mitigation to prevent potential privilege escalation and data compromise.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:05:37 UTC

Technical Analysis

CVE-2024-50803 identifies a Cross Site Scripting (XSS) vulnerability in the mediapool feature of the Redaxo Core CMS version 5.17.1. The mediapool feature, which likely handles media file management within the CMS, fails to properly sanitize user-supplied input, allowing injection of malicious scripts. This XSS vulnerability can be exploited remotely by an attacker with limited privileges (PR:L) and requires user interaction (UI:R), such as convincing a user to click a crafted link or visit a malicious page. The vulnerability has a scope of changed security context (S:C), meaning the attack can escalate privileges or affect other users beyond the attacker’s initial privileges. The CVSS vector indicates network attack vector (AV:N), low attack complexity (AC:L), and impacts confidentiality and integrity partially (C:L/I:L), but does not affect availability (A:N). Although no known exploits are reported in the wild and no patches have been released, the vulnerability poses a risk of privilege escalation through XSS, potentially allowing attackers to execute arbitrary scripts in the context of other users or administrators, leading to unauthorized actions or data leakage within the CMS environment. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation.

Potential Impact

The primary impact of CVE-2024-50803 is the potential for privilege escalation within Redaxo CMS environments, which can lead to unauthorized access to sensitive data and administrative functions. Successful exploitation could allow attackers to execute arbitrary JavaScript in the context of other users, potentially stealing session tokens, modifying content, or performing actions on behalf of higher-privileged users. This undermines the confidentiality and integrity of the CMS and its hosted content. Although availability is not directly impacted, the compromise of administrative privileges could lead to further attacks or persistent backdoors. Organizations relying on Redaxo CMS for web content management, especially those with multiple user roles and sensitive data, face increased risk of data breaches and unauthorized modifications. The lack of a patch increases exposure time, and the medium severity suggests a moderate but actionable threat. The requirement for user interaction and some privileges limits the attack surface but does not eliminate risk, especially in environments with many users or where social engineering is feasible.

Mitigation Recommendations

To mitigate CVE-2024-50803, organizations should first monitor official Redaxo CMS channels for patches or updates addressing this vulnerability and apply them promptly once available. In the interim, administrators should restrict access to the mediapool feature to trusted users only and enforce the principle of least privilege to minimize the number of users with access rights that could be exploited. Implement Content Security Policy (CSP) headers to reduce the impact of XSS by restricting the execution of unauthorized scripts. Additionally, web application firewalls (WAFs) can be configured to detect and block suspicious input patterns targeting the mediapool feature. Educate users about the risks of clicking untrusted links or interacting with unknown content to reduce the likelihood of successful social engineering. Conduct regular security audits and code reviews focusing on input validation and output encoding in custom CMS extensions or plugins. Finally, consider isolating the CMS environment and monitoring logs for unusual activity indicative of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b9eb7ef31ef0b55747f

Added to database: 2/25/2026, 9:37:34 PM

Last enriched: 2/26/2026, 1:05:37 AM

Last updated: 2/26/2026, 7:01:32 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats