Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51379: n/a

0
High
VulnerabilityCVE-2024-51379cvecve-2024-51379
Published: Tue Nov 05 2024 (11/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Stored Cross-Site Scripting (XSS) vulnerability discovered in JATOS v3.9.3. The vulnerability exists in the description component of the study section, where an attacker can inject JavaScript into the description field. This allows for the execution of malicious scripts when an admin views the description, potentially leading to account takeover and unauthorized actions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 02:55:56 UTC

Technical Analysis

CVE-2024-51379 is a stored Cross-Site Scripting (XSS) vulnerability identified in JATOS version 3.9.3, a platform commonly used for managing online studies and experiments. The vulnerability resides in the description component of the study section, where user input is insufficiently sanitized or escaped, allowing attackers to inject arbitrary JavaScript code. This malicious script is stored persistently and executed when an administrator views the affected description field. Because the victim is an admin, the impact is severe: the attacker can hijack admin sessions, perform unauthorized actions, and potentially take over the entire application or underlying systems. The CVSS 3.1 score of 8.4 reflects the high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, but requiring high privileges for injection and user interaction for execution. No patches or exploits are currently publicly available, but the vulnerability is critical for environments relying on JATOS for sensitive research data management.

Potential Impact

The vulnerability allows attackers to execute arbitrary JavaScript in the context of an administrator’s browser, leading to potential account takeover, unauthorized data access, and manipulation of study data or configurations. This can compromise the confidentiality of sensitive research data, integrity of study results, and availability of the JATOS service. Attackers could also leverage the admin’s privileges to pivot deeper into the network or exfiltrate data. Given that JATOS is used globally in academic and research institutions, exploitation could disrupt critical research activities and damage organizational reputation. The requirement for admin interaction limits mass exploitation but targeted attacks against high-value research environments pose significant risk.

Mitigation Recommendations

Organizations should immediately review and sanitize all user inputs in the description fields, employing strict input validation and output encoding to prevent script injection. Implement Content Security Policy (CSP) headers to restrict script execution origins. Limit admin access and monitor admin activities for suspicious behavior. Regularly update JATOS to the latest version once a patch is released. In the interim, restrict who can submit or edit study descriptions and conduct manual reviews before publishing. Employ web application firewalls (WAFs) with rules to detect and block XSS payloads targeting JATOS. Educate administrators about the risk of clicking on untrusted content within the platform.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bb1b7ef31ef0b55a24a

Added to database: 2/25/2026, 9:37:53 PM

Last enriched: 2/28/2026, 2:55:56 AM

Last updated: 4/12/2026, 3:41:07 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses