Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50842: n/a

0
Medium
VulnerabilityCVE-2024-50842cvecve-2024-50842
Published: Thu Nov 14 2024 (11/14/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-50842 is a stored Cross-Site Scripting (XSS) vulnerability in the KASHIPARA E-learning Management System Project 1. 0, specifically in the /admin/school_year. php component. It allows remote attackers with limited privileges to execute arbitrary scripts by injecting malicious code via the school_year parameter. Exploitation requires user interaction and some level of authentication, but can lead to compromised confidentiality and integrity within the affected system. The vulnerability has a CVSS score of 5. 4 (medium severity) and does not impact availability. No known exploits are currently in the wild, and no patches have been published yet. Organizations using this e-learning platform should prioritize mitigating this vulnerability to prevent potential session hijacking, data theft, or unauthorized actions performed through injected scripts.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:09:15 UTC

Technical Analysis

CVE-2024-50842 identifies a stored Cross-Site Scripting (XSS) vulnerability in the KASHIPARA E-learning Management System Project 1.0, located in the /admin/school_year.php file. This vulnerability arises from insufficient input validation and output encoding of the school_year parameter, allowing an authenticated attacker with limited privileges to inject malicious JavaScript code that is stored persistently on the server. When other users or administrators access the affected page, the injected script executes in their browsers within the context of the vulnerable application. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), which is a common web application security flaw. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) indicates that the attack is network-based, requires low attack complexity, needs privileges but only limited, requires user interaction, and affects confidentiality and integrity with a scope change, but does not affect availability. No patches or known exploits are currently available, but the vulnerability poses a risk of session hijacking, credential theft, or unauthorized actions via script execution in the victim's browser.

Potential Impact

The primary impact of this vulnerability is the compromise of confidentiality and integrity within the KASHIPARA E-learning Management System. Attackers can leverage the stored XSS to steal session cookies, perform actions on behalf of legitimate users, or inject malicious content that misleads or harms users. This can lead to unauthorized access to sensitive educational data, manipulation of administrative functions, or broader compromise of user accounts. Since the vulnerability requires some level of authentication and user interaction, the risk is somewhat mitigated but still significant in environments where multiple users have access to the admin interface. Educational institutions and organizations relying on this platform could face data breaches, reputational damage, and potential regulatory consequences if exploited.

Mitigation Recommendations

To mitigate CVE-2024-50842, organizations should implement strict input validation and output encoding for the school_year parameter and any other user-supplied data in the application. Employ context-aware escaping techniques to neutralize scripts before rendering them in the browser. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Limit administrative privileges to trusted personnel and enforce multi-factor authentication to reduce the risk of credential compromise. Regularly monitor logs for suspicious activities related to the vulnerable endpoint. Since no official patch is available, consider applying virtual patching via Web Application Firewalls (WAFs) that can detect and block malicious payloads targeting the school_year parameter. Finally, keep the system and dependencies updated and prepare to apply vendor patches once released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ba0b7ef31ef0b55755d

Added to database: 2/25/2026, 9:37:36 PM

Last enriched: 2/26/2026, 1:09:15 AM

Last updated: 2/26/2026, 9:34:52 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats