Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50837: n/a

0
Medium
VulnerabilityCVE-2024-50837cvecve-2024-50837
Published: Thu Nov 14 2024 (11/14/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-50837 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability in the KASHIPARA E-learning Management System Project 1. 0, specifically in the /admin/admin_user. php page. It allows remote attackers with limited privileges to execute arbitrary scripts by injecting malicious code into the firstname and username parameters. Exploitation requires user interaction and some level of authentication, but can lead to session hijacking or privilege escalation due to the vulnerability's scope. No known exploits are currently in the wild, and no patches have been published yet. The vulnerability impacts confidentiality and integrity but does not affect availability. Organizations using this e-learning platform should prioritize input validation and output encoding to mitigate risks. Countries with significant adoption of this software or similar e-learning platforms, especially in educational sectors, are at higher risk. The CVSS score is 5.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:07:56 UTC

Technical Analysis

CVE-2024-50837 is a Stored Cross-Site Scripting (XSS) vulnerability identified in the KASHIPARA E-learning Management System Project version 1.0. The vulnerability exists in the /admin/admin_user.php script, where the firstname and username parameters do not properly sanitize or encode user-supplied input before storing and rendering it in the administrative interface. This flaw allows an authenticated attacker with at least limited privileges (PR:L) to inject malicious JavaScript code that is persistently stored and executed in the context of other users who access the affected page. The attack requires user interaction (UI:R), such as an administrator viewing the compromised user data, and can lead to the compromise of confidentiality and integrity by enabling session hijacking, credential theft, or unauthorized actions within the application. The vulnerability has a CVSS 3.1 base score of 5.4, indicating medium severity, with an attack vector of network (AV:N) and low attack complexity (AC:L). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The CWE classification is CWE-79, which corresponds to Cross-Site Scripting vulnerabilities.

Potential Impact

The primary impact of CVE-2024-50837 is on the confidentiality and integrity of the affected e-learning system. Successful exploitation can allow attackers to execute arbitrary scripts in the context of administrative users, potentially leading to session hijacking, theft of sensitive information, or unauthorized administrative actions. This can compromise user data, including personal information and educational records, and may facilitate further attacks within the network. Although availability is not directly affected, the breach of trust and data integrity can disrupt normal operations and damage organizational reputation. Educational institutions and organizations relying on the KASHIPARA E-learning Management System are at risk of targeted attacks, especially if administrative users are tricked into interacting with maliciously crafted user profiles. The vulnerability's medium severity and requirement for some privileges reduce the likelihood of widespread exploitation but do not eliminate the risk, particularly in environments with weak access controls or insufficient monitoring.

Mitigation Recommendations

To mitigate CVE-2024-50837, organizations should implement strict input validation and output encoding on all user-supplied data, especially the firstname and username parameters in the /admin/admin_user.php page. Employing context-aware encoding (e.g., HTML entity encoding) before rendering data in the browser is critical to prevent script execution. Additionally, applying the principle of least privilege to administrative accounts can limit the potential damage from exploitation. Monitoring and logging administrative actions and user input changes can help detect suspicious activities early. If possible, isolate the administrative interface from general user access and enforce multi-factor authentication to reduce the risk of compromised credentials. Organizations should also stay alert for official patches or updates from the KASHIPARA project and apply them promptly once available. In the interim, consider deploying Web Application Firewalls (WAFs) with rules to detect and block common XSS payloads targeting the affected parameters.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ba0b7ef31ef0b55754e

Added to database: 2/25/2026, 9:37:36 PM

Last enriched: 2/26/2026, 1:07:56 AM

Last updated: 2/26/2026, 7:08:26 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats