Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5142: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in M-Files Corporation Hubshare

0
High
VulnerabilityCVE-2024-5142cvecve-2024-5142cwe-79
Published: Fri May 24 2024 (05/24/2024, 05:58:41 UTC)
Source: CVE Database V5
Vendor/Project: M-Files Corporation
Product: Hubshare

Description

Stored Cross-Site Scripting vulnerability in Social Module in M-Files Hubshare before version 5.0.6.0 allows authenticated attacker to run scripts in other users browser

AI-Powered Analysis

AILast updated: 02/23/2026, 10:31:49 UTC

Technical Analysis

CVE-2024-5142 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Social Module of M-Files Corporation's Hubshare platform, affecting versions before 5.0.6.0. The vulnerability stems from improper neutralization of user-supplied input during web page generation, allowing an authenticated attacker with low privileges to inject malicious JavaScript code that is persistently stored and executed in the browsers of other users who access the compromised content. This type of XSS is particularly dangerous because the malicious payload is stored on the server and served to multiple users, increasing the attack surface. The vulnerability is classified under CWE-79, which covers improper input sanitization leading to script injection. The CVSS 4.0 vector indicates the attack can be launched remotely over the network without specialized access (AV:N), with low complexity (AC:L), and does not require attacker privileges beyond authentication (PR:L). User interaction is required (UI:P) for the victim to trigger the malicious script, such as by viewing a social module post or comment. The impact includes high confidentiality impact (VC:H) due to potential theft of session tokens or sensitive data, low integrity impact (VI:L) from possible unauthorized actions, and no availability impact. Although no known exploits are reported in the wild, the vulnerability poses a significant risk to organizations relying on Hubshare for collaboration and document sharing. The Social Module is a common feature used for communication and content sharing, making it a valuable target for attackers seeking to compromise user sessions or conduct phishing attacks. The lack of a patch link suggests that organizations should monitor vendor advisories closely and apply updates promptly once available.

Potential Impact

The exploitation of CVE-2024-5142 can lead to significant security consequences for organizations using affected versions of M-Files Hubshare. Successful attacks can result in session hijacking, enabling attackers to impersonate legitimate users and access sensitive documents or internal resources. Data confidentiality is at high risk, as malicious scripts can exfiltrate authentication tokens, personal information, or corporate data accessible through the platform. Integrity may be compromised through unauthorized actions performed via the victim's browser, such as posting malicious content or modifying shared information. Although availability impact is not indicated, the reputational damage and potential regulatory consequences from data breaches could be severe. The requirement for attacker authentication limits the attack vector to insiders or compromised accounts, but the low complexity and network accessibility increase the likelihood of exploitation. Organizations with extensive use of Hubshare's social collaboration features, especially those with many users and sensitive data, face elevated risks. Additionally, attackers could leverage this vulnerability as a foothold for broader network compromise or lateral movement within the enterprise environment.

Mitigation Recommendations

To mitigate CVE-2024-5142, organizations should prioritize upgrading M-Files Hubshare to version 5.0.6.0 or later once the patch is released by the vendor. Until a patch is available, administrators should restrict access to the Social Module to trusted users and monitor for suspicious activity indicative of XSS exploitation attempts. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block common XSS payloads targeting Hubshare can provide interim protection. Enforce strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in users' browsers. Educate users about the risks of interacting with untrusted content within the platform and encourage reporting of unusual behavior. Conduct regular security assessments and penetration testing focused on web application input validation and output encoding. Review and harden authentication mechanisms to reduce the risk posed by compromised accounts. Finally, log and monitor all user-generated content submissions in the Social Module for anomalous patterns or injection attempts to enable rapid incident response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
M-Files Corporation
Date Reserved
2024-05-20T10:11:41.796Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699c2930be58cf853b7275ea

Added to database: 2/23/2026, 10:17:20 AM

Last enriched: 2/23/2026, 10:31:49 AM

Last updated: 2/24/2026, 5:28:54 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats