CVE-2024-50983: n/a
FlightPath 7.5 contains a Cross Site Scripting (XSS) vulnerability, which allows authenticated remote attackers with administrative rights to inject arbitrary JavaScript in the web browser of a user by including a malicious payload into the Last Name section in the Create/Edit Faculty/Staff User or Create/Edit Student User sections.
AI Analysis
Technical Summary
CVE-2024-50983 is a stored Cross Site Scripting (XSS) vulnerability affecting FlightPath version 7.5. The flaw exists because the application fails to properly sanitize or encode user input in the Last Name field within the Create/Edit Faculty/Staff User and Create/Edit Student User interfaces. An attacker with authenticated administrative privileges can inject malicious JavaScript payloads into this field. When another user views the affected user record, the injected script executes in their browser context, potentially allowing session hijacking, privilege escalation, or unauthorized actions within the application. The vulnerability requires the attacker to have administrative rights, which limits the attack surface but increases the risk if such credentials are compromised. The CVSS v3.1 score is 6.1, reflecting network attack vector, low attack complexity, privileges required, user interaction needed, and impacts on confidentiality and integrity but not availability. No patches or known exploits have been reported yet, but the vulnerability is publicly disclosed as of November 15, 2024. The underlying weakness corresponds to CWE-79, a common XSS category.
Potential Impact
This vulnerability can lead to unauthorized script execution in the browsers of users who view the maliciously crafted user profiles, potentially resulting in session hijacking, theft of sensitive information, or unauthorized actions performed with the victim’s privileges. Since exploitation requires administrative credentials, the impact is somewhat contained but significant in environments where multiple administrators or privileged users exist. Confidentiality and integrity of user data and sessions are at risk, which could lead to broader compromise of the FlightPath system or connected resources. The lack of availability impact reduces the risk of denial-of-service conditions. Organizations using FlightPath 7.5 in educational or institutional environments could face reputational damage, data breaches, or compliance violations if this vulnerability is exploited.
Mitigation Recommendations
Organizations should immediately review and restrict administrative access to trusted personnel only, enforcing strong authentication and monitoring for suspicious activity. Input validation and output encoding should be implemented or enhanced in the Last Name field and other user input areas to prevent script injection. FlightPath vendors or administrators should prioritize releasing and applying patches that sanitize user inputs properly. In the interim, administrators can mitigate risk by limiting the number of users with administrative privileges and educating users to avoid interacting with suspicious user profiles. Web application firewalls (WAFs) can be configured to detect and block common XSS payloads targeting this vector. Regular security audits and penetration testing focused on user input handling are recommended to identify similar vulnerabilities.
Affected Countries
United States, Canada, United Kingdom, Australia, Germany, France, India, Japan, South Korea, Brazil
CVE-2024-50983: n/a
Description
FlightPath 7.5 contains a Cross Site Scripting (XSS) vulnerability, which allows authenticated remote attackers with administrative rights to inject arbitrary JavaScript in the web browser of a user by including a malicious payload into the Last Name section in the Create/Edit Faculty/Staff User or Create/Edit Student User sections.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-50983 is a stored Cross Site Scripting (XSS) vulnerability affecting FlightPath version 7.5. The flaw exists because the application fails to properly sanitize or encode user input in the Last Name field within the Create/Edit Faculty/Staff User and Create/Edit Student User interfaces. An attacker with authenticated administrative privileges can inject malicious JavaScript payloads into this field. When another user views the affected user record, the injected script executes in their browser context, potentially allowing session hijacking, privilege escalation, or unauthorized actions within the application. The vulnerability requires the attacker to have administrative rights, which limits the attack surface but increases the risk if such credentials are compromised. The CVSS v3.1 score is 6.1, reflecting network attack vector, low attack complexity, privileges required, user interaction needed, and impacts on confidentiality and integrity but not availability. No patches or known exploits have been reported yet, but the vulnerability is publicly disclosed as of November 15, 2024. The underlying weakness corresponds to CWE-79, a common XSS category.
Potential Impact
This vulnerability can lead to unauthorized script execution in the browsers of users who view the maliciously crafted user profiles, potentially resulting in session hijacking, theft of sensitive information, or unauthorized actions performed with the victim’s privileges. Since exploitation requires administrative credentials, the impact is somewhat contained but significant in environments where multiple administrators or privileged users exist. Confidentiality and integrity of user data and sessions are at risk, which could lead to broader compromise of the FlightPath system or connected resources. The lack of availability impact reduces the risk of denial-of-service conditions. Organizations using FlightPath 7.5 in educational or institutional environments could face reputational damage, data breaches, or compliance violations if this vulnerability is exploited.
Mitigation Recommendations
Organizations should immediately review and restrict administrative access to trusted personnel only, enforcing strong authentication and monitoring for suspicious activity. Input validation and output encoding should be implemented or enhanced in the Last Name field and other user input areas to prevent script injection. FlightPath vendors or administrators should prioritize releasing and applying patches that sanitize user inputs properly. In the interim, administrators can mitigate risk by limiting the number of users with administrative privileges and educating users to avoid interacting with suspicious user profiles. Web application firewalls (WAFs) can be configured to detect and block common XSS payloads targeting this vector. Regular security audits and penetration testing focused on user input handling are recommended to identify similar vulnerabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-10-28T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6ba4b7ef31ef0b557740
Added to database: 2/25/2026, 9:37:40 PM
Last enriched: 2/28/2026, 2:38:48 AM
Last updated: 4/11/2026, 10:14:17 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.