Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51687: Cross-Site Request Forgery (CSRF) in Platform.ly Platform.ly Official

0
Unknown
VulnerabilityCVE-2024-51687cvecve-2024-51687
Published: Thu Nov 14 2024 (11/14/2024, 20:25:44 UTC)
Source: CVE Database V5
Vendor/Project: Platform.ly
Product: Platform.ly Official

Description

Cross-Site Request Forgery (CSRF) vulnerability in Platform.ly Platform.ly Official platformly allows Stored XSS.This issue affects Platform.ly Official: from n/a through <= 1.1.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 07:57:49 UTC

Technical Analysis

CVE-2024-51687 identifies a security vulnerability in Platform.ly Official, a marketing automation platform, specifically versions up to and including 1.1.3. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that allows attackers to trick authenticated users into executing unwanted actions on the platform. This is compounded by the presence of Stored Cross-Site Scripting (XSS), which means that malicious scripts can be persistently stored on the platform and executed in the context of other users' browsers. The CSRF vulnerability arises because the platform does not adequately verify the origin or authenticity of requests, allowing attackers to craft malicious web pages that, when visited by logged-in users, perform unauthorized operations such as changing settings, injecting malicious content, or manipulating data. The Stored XSS aspect can be leveraged to steal session tokens, perform further attacks, or spread malware. Although no exploits have been reported in the wild yet, the vulnerability is publicly disclosed and could be targeted by attackers. The lack of an official patch or CVSS score indicates that organizations must proactively assess and mitigate the risk. The vulnerability affects the confidentiality, integrity, and availability of the platform and its users, potentially leading to data breaches, unauthorized control, and reputational damage.

Potential Impact

The impact of CVE-2024-51687 is significant for organizations using Platform.ly Official. Successful exploitation can lead to unauthorized actions performed with the privileges of authenticated users, including administrators, which may result in data manipulation, unauthorized data disclosure, or disruption of marketing campaigns. The Stored XSS component increases the risk by enabling persistent malicious scripts that can compromise user sessions, steal credentials, or propagate further attacks within the organization. This can lead to loss of customer trust, regulatory penalties due to data breaches, and operational downtime. Since Platform.ly is used globally for marketing automation, organizations relying on it for customer engagement and data management face risks to both their internal systems and external customer data. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure. The requirement for user authentication and victim interaction (visiting a malicious site) somewhat limits the attack vector but does not prevent exploitation in targeted phishing or social engineering campaigns.

Mitigation Recommendations

To mitigate CVE-2024-51687, organizations should first check for any patches or updates from Platform.ly and apply them immediately once available. In the absence of official patches, implement strict anti-CSRF tokens on all state-changing requests to ensure that requests originate from legitimate sources. Employ Content Security Policy (CSP) headers to reduce the impact of Stored XSS by restricting script execution sources. Regularly audit and sanitize all user inputs and stored data to prevent injection of malicious scripts. Educate users about phishing and social engineering risks to reduce the likelihood of visiting malicious sites. Monitor logs for unusual activities that may indicate exploitation attempts. Consider isolating or limiting the privileges of Platform.ly users to minimize potential damage. Additionally, use web application firewalls (WAFs) with rules designed to detect and block CSRF and XSS attack patterns. Finally, conduct regular security assessments and penetration testing focused on web application vulnerabilities to identify and remediate similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-10-30T15:05:46.518Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7514e6bfc5ba1df02b45

Added to database: 4/1/2026, 7:42:12 PM

Last enriched: 4/2/2026, 7:57:49 AM

Last updated: 4/6/2026, 9:30:07 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses