CVE-2024-52702: n/a
A stored cross-site scripting (XSS) vulnerability in the component install\index.php of MyBB v1.8.38 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website Name parameter. NOTE: this is disputed by the Supplier because Website Name can only be set by an administrator, who may use JavaScript if they wish.
AI Analysis
Technical Summary
CVE-2024-52702 identifies a stored cross-site scripting (XSS) vulnerability in the install\index.php component of MyBB version 1.8.38, a popular open-source forum software. The vulnerability arises from insufficient sanitization of the Website Name parameter, which can be manipulated to inject malicious JavaScript or HTML payloads that persist on the server. When an administrator sets the Website Name, the crafted payload is stored and subsequently executed in the context of users visiting the forum, potentially leading to session hijacking, defacement, or redirection attacks. The supplier disputes the severity, arguing that since only administrators can modify this parameter and they already have high privileges, the risk is limited. The CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) indicates that the attack can be launched remotely over the network with low attack complexity, requires privileges equivalent to an administrator, and user interaction is needed to trigger the payload. The vulnerability impacts confidentiality and integrity but not availability, and the scope is changed due to the potential for cross-site scripting affecting other users. No public exploits have been reported yet, and no patches are currently linked, so mitigation relies on administrative controls and input validation.
Potential Impact
For European organizations using MyBB forums, this vulnerability could allow an attacker with administrative access to inject malicious scripts that execute in the browsers of forum users, potentially compromising user sessions, stealing sensitive information, or defacing the forum. Although exploitation requires administrative privileges, insider threats or compromised administrator accounts could leverage this flaw to escalate damage. The impact on confidentiality and integrity is moderate, as attackers could hijack sessions or manipulate displayed content. Availability is not affected. Given the widespread use of MyBB in community forums and support sites across Europe, especially in small to medium enterprises and niche communities, this vulnerability could undermine user trust and lead to reputational damage. Organizations with less stringent administrative controls or weak account security are at higher risk.
Mitigation Recommendations
European organizations should implement strict access controls and multi-factor authentication for administrator accounts to reduce the risk of account compromise. Input validation and output encoding should be enforced on the Website Name parameter to prevent injection of malicious scripts. Although the supplier disputes the vulnerability, applying custom patches or web application firewall (WAF) rules to detect and block suspicious payloads targeting the Website Name field is recommended. Regular security audits of administrative inputs and monitoring of forum content for anomalous scripts can help detect exploitation attempts. Additionally, educating administrators about the risks of injecting JavaScript in configuration fields and limiting the use of such scripts can reduce attack surface. Organizations should stay alert for official patches or updates from MyBB and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-52702: n/a
Description
A stored cross-site scripting (XSS) vulnerability in the component install\index.php of MyBB v1.8.38 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website Name parameter. NOTE: this is disputed by the Supplier because Website Name can only be set by an administrator, who may use JavaScript if they wish.
AI-Powered Analysis
Technical Analysis
CVE-2024-52702 identifies a stored cross-site scripting (XSS) vulnerability in the install\index.php component of MyBB version 1.8.38, a popular open-source forum software. The vulnerability arises from insufficient sanitization of the Website Name parameter, which can be manipulated to inject malicious JavaScript or HTML payloads that persist on the server. When an administrator sets the Website Name, the crafted payload is stored and subsequently executed in the context of users visiting the forum, potentially leading to session hijacking, defacement, or redirection attacks. The supplier disputes the severity, arguing that since only administrators can modify this parameter and they already have high privileges, the risk is limited. The CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) indicates that the attack can be launched remotely over the network with low attack complexity, requires privileges equivalent to an administrator, and user interaction is needed to trigger the payload. The vulnerability impacts confidentiality and integrity but not availability, and the scope is changed due to the potential for cross-site scripting affecting other users. No public exploits have been reported yet, and no patches are currently linked, so mitigation relies on administrative controls and input validation.
Potential Impact
For European organizations using MyBB forums, this vulnerability could allow an attacker with administrative access to inject malicious scripts that execute in the browsers of forum users, potentially compromising user sessions, stealing sensitive information, or defacing the forum. Although exploitation requires administrative privileges, insider threats or compromised administrator accounts could leverage this flaw to escalate damage. The impact on confidentiality and integrity is moderate, as attackers could hijack sessions or manipulate displayed content. Availability is not affected. Given the widespread use of MyBB in community forums and support sites across Europe, especially in small to medium enterprises and niche communities, this vulnerability could undermine user trust and lead to reputational damage. Organizations with less stringent administrative controls or weak account security are at higher risk.
Mitigation Recommendations
European organizations should implement strict access controls and multi-factor authentication for administrator accounts to reduce the risk of account compromise. Input validation and output encoding should be enforced on the Website Name parameter to prevent injection of malicious scripts. Although the supplier disputes the vulnerability, applying custom patches or web application firewall (WAF) rules to detect and block suspicious payloads targeting the Website Name field is recommended. Regular security audits of administrative inputs and monitoring of forum content for anomalous scripts can help detect exploitation attempts. Additionally, educating administrators about the risks of injecting JavaScript in configuration fields and limiting the use of such scripts can reduce attack surface. Organizations should stay alert for official patches or updates from MyBB and apply them promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2024-11-15T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69367514232db2b373822962
Added to database: 12/8/2025, 6:49:56 AM
Last enriched: 12/8/2025, 7:05:17 AM
Last updated: 12/8/2025, 12:10:19 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14230: SQL Injection in code-projects Daily Time Recording System
MediumCVE-2025-14229: CSV Injection in SourceCodester Inventory Management System
MediumCVE-2025-14228: Cross Site Scripting in Yealink SIP-T21P E2
MediumCVE-2025-14227: SQL Injection in Philipinho Simple-PHP-Blog
MediumCVE-2025-66461: Unquoted search path or element in GS Yuasa International Ltd. FULLBACK Manager Pro (for Windows)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.