Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-52702: n/a

0
Medium
VulnerabilityCVE-2024-52702cvecve-2024-52702
Published: Wed Nov 20 2024 (11/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A stored cross-site scripting (XSS) vulnerability in the component install\index.php of MyBB v1.8.38 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website Name parameter. NOTE: this is disputed by the Supplier because Website Name can only be set by an administrator, who may use JavaScript if they wish.

AI-Powered Analysis

AILast updated: 12/08/2025, 07:05:17 UTC

Technical Analysis

CVE-2024-52702 identifies a stored cross-site scripting (XSS) vulnerability in the install\index.php component of MyBB version 1.8.38, a popular open-source forum software. The vulnerability arises from insufficient sanitization of the Website Name parameter, which can be manipulated to inject malicious JavaScript or HTML payloads that persist on the server. When an administrator sets the Website Name, the crafted payload is stored and subsequently executed in the context of users visiting the forum, potentially leading to session hijacking, defacement, or redirection attacks. The supplier disputes the severity, arguing that since only administrators can modify this parameter and they already have high privileges, the risk is limited. The CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) indicates that the attack can be launched remotely over the network with low attack complexity, requires privileges equivalent to an administrator, and user interaction is needed to trigger the payload. The vulnerability impacts confidentiality and integrity but not availability, and the scope is changed due to the potential for cross-site scripting affecting other users. No public exploits have been reported yet, and no patches are currently linked, so mitigation relies on administrative controls and input validation.

Potential Impact

For European organizations using MyBB forums, this vulnerability could allow an attacker with administrative access to inject malicious scripts that execute in the browsers of forum users, potentially compromising user sessions, stealing sensitive information, or defacing the forum. Although exploitation requires administrative privileges, insider threats or compromised administrator accounts could leverage this flaw to escalate damage. The impact on confidentiality and integrity is moderate, as attackers could hijack sessions or manipulate displayed content. Availability is not affected. Given the widespread use of MyBB in community forums and support sites across Europe, especially in small to medium enterprises and niche communities, this vulnerability could undermine user trust and lead to reputational damage. Organizations with less stringent administrative controls or weak account security are at higher risk.

Mitigation Recommendations

European organizations should implement strict access controls and multi-factor authentication for administrator accounts to reduce the risk of account compromise. Input validation and output encoding should be enforced on the Website Name parameter to prevent injection of malicious scripts. Although the supplier disputes the vulnerability, applying custom patches or web application firewall (WAF) rules to detect and block suspicious payloads targeting the Website Name field is recommended. Regular security audits of administrative inputs and monitoring of forum content for anomalous scripts can help detect exploitation attempts. Additionally, educating administrators about the risks of injecting JavaScript in configuration fields and limiting the use of such scripts can reduce attack surface. Organizations should stay alert for official patches or updates from MyBB and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-11-15T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69367514232db2b373822962

Added to database: 12/8/2025, 6:49:56 AM

Last enriched: 12/8/2025, 7:05:17 AM

Last updated: 12/8/2025, 12:10:19 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats