Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51507: n/a

0
Medium
VulnerabilityCVE-2024-51507cvecve-2024-51507
Published: Mon Oct 28 2024 (10/28/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tiki through 27.0 allows users who have certain permissions to insert a "Create/Edit External Wiki" stored XSS payload in the Name.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 02:59:12 UTC

Technical Analysis

CVE-2024-51507 is a stored cross-site scripting (XSS) vulnerability identified in the Tiki content management system (CMS) up to version 27.0. The vulnerability arises from insufficient input sanitization in the 'Create/Edit External Wiki' feature, specifically in the Name field, which allows users with certain permissions to inject malicious JavaScript payloads. When such a payload is stored, it can be executed in the context of other users who view the affected page, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the CMS. The vulnerability requires the attacker to have authenticated access with elevated privileges (PR:H) and involves user interaction (UI:R) to trigger the malicious script. The CVSS v3.1 vector (AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N) indicates network attack vector, low attack complexity, high privileges required, user interaction required, scope changed, and low impact on confidentiality and integrity, with no impact on availability. No public exploits or patches are currently available, emphasizing the need for proactive mitigation. The vulnerability is classified under CWE-79, which covers cross-site scripting issues. Given the nature of stored XSS, the threat can persist and affect multiple users over time if exploited.

Potential Impact

The primary impact of CVE-2024-51507 is on the confidentiality and integrity of data within affected Tiki CMS installations. An attacker exploiting this vulnerability could execute arbitrary JavaScript in the context of other users, potentially stealing session cookies, performing actions on behalf of users, or injecting malicious content. This can lead to unauthorized access to sensitive information or manipulation of CMS content. Although availability is not directly affected, the trustworthiness and security posture of the CMS environment can be compromised. Organizations relying on Tiki CMS for collaboration, documentation, or knowledge management may face reputational damage and operational disruption if attackers leverage this vulnerability. The requirement for elevated privileges and user interaction limits the ease of exploitation but does not eliminate risk, especially in environments with many privileged users or where social engineering can be employed.

Mitigation Recommendations

To mitigate CVE-2024-51507, organizations should implement the following specific measures: 1) Restrict permissions carefully to limit which users can create or edit external wiki entries, minimizing the number of users who can inject content. 2) Apply strict input validation and output encoding on the 'Name' field and other user-supplied inputs within Tiki CMS to prevent script injection. 3) Monitor and audit changes to external wiki entries for suspicious or unexpected content. 4) Educate privileged users about the risks of stored XSS and encourage cautious behavior when editing content. 5) If possible, deploy web application firewalls (WAFs) with rules to detect and block XSS payloads targeting Tiki CMS. 6) Stay alert for official patches or updates from the Tiki CMS development team and apply them promptly once available. 7) Consider isolating or sandboxing the CMS environment to limit the impact of potential exploitation. These targeted actions go beyond generic advice by focusing on the specific vulnerability vector and user roles involved.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bb3b7ef31ef0b55a341

Added to database: 2/25/2026, 9:37:55 PM

Last enriched: 2/28/2026, 2:59:12 AM

Last updated: 4/12/2026, 3:46:08 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses