Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50983: n/a

0
Medium
VulnerabilityCVE-2024-50983cvecve-2024-50983
Published: Fri Nov 15 2024 (11/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

FlightPath 7.5 contains a Cross Site Scripting (XSS) vulnerability, which allows authenticated remote attackers with administrative rights to inject arbitrary JavaScript in the web browser of a user by including a malicious payload into the Last Name section in the Create/Edit Faculty/Staff User or Create/Edit Student User sections.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 02:38:48 UTC

Technical Analysis

CVE-2024-50983 is a stored Cross Site Scripting (XSS) vulnerability affecting FlightPath version 7.5. The flaw exists because the application fails to properly sanitize or encode user input in the Last Name field within the Create/Edit Faculty/Staff User and Create/Edit Student User interfaces. An attacker with authenticated administrative privileges can inject malicious JavaScript payloads into this field. When another user views the affected user record, the injected script executes in their browser context, potentially allowing session hijacking, privilege escalation, or unauthorized actions within the application. The vulnerability requires the attacker to have administrative rights, which limits the attack surface but increases the risk if such credentials are compromised. The CVSS v3.1 score is 6.1, reflecting network attack vector, low attack complexity, privileges required, user interaction needed, and impacts on confidentiality and integrity but not availability. No patches or known exploits have been reported yet, but the vulnerability is publicly disclosed as of November 15, 2024. The underlying weakness corresponds to CWE-79, a common XSS category.

Potential Impact

This vulnerability can lead to unauthorized script execution in the browsers of users who view the maliciously crafted user profiles, potentially resulting in session hijacking, theft of sensitive information, or unauthorized actions performed with the victim’s privileges. Since exploitation requires administrative credentials, the impact is somewhat contained but significant in environments where multiple administrators or privileged users exist. Confidentiality and integrity of user data and sessions are at risk, which could lead to broader compromise of the FlightPath system or connected resources. The lack of availability impact reduces the risk of denial-of-service conditions. Organizations using FlightPath 7.5 in educational or institutional environments could face reputational damage, data breaches, or compliance violations if this vulnerability is exploited.

Mitigation Recommendations

Organizations should immediately review and restrict administrative access to trusted personnel only, enforcing strong authentication and monitoring for suspicious activity. Input validation and output encoding should be implemented or enhanced in the Last Name field and other user input areas to prevent script injection. FlightPath vendors or administrators should prioritize releasing and applying patches that sanitize user inputs properly. In the interim, administrators can mitigate risk by limiting the number of users with administrative privileges and educating users to avoid interacting with suspicious user profiles. Web application firewalls (WAFs) can be configured to detect and block common XSS payloads targeting this vector. Regular security audits and penetration testing focused on user input handling are recommended to identify similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ba4b7ef31ef0b557740

Added to database: 2/25/2026, 9:37:40 PM

Last enriched: 2/28/2026, 2:38:48 AM

Last updated: 4/11/2026, 10:14:17 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses