Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-53470: n/a

0
Medium
VulnerabilityCVE-2024-53470cvecve-2024-53470
Published: Thu Dec 05 2024 (12/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-53470 is a medium severity stored cross-site scripting (XSS) vulnerability found in the /configuracao/gateway_pagamento. php component of WeGIA v3. 2. 0. Attackers can inject malicious scripts via the id or name parameters, which are stored and later executed in users' browsers. Exploitation requires user interaction but no authentication, potentially allowing attackers to steal session tokens, perform actions on behalf of users, or deliver malware. No known exploits are currently reported in the wild. The vulnerability impacts confidentiality and integrity but not availability. Organizations using WeGIA v3. 2.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:44:14 UTC

Technical Analysis

CVE-2024-53470 identifies multiple stored cross-site scripting (XSS) vulnerabilities in the WeGIA v3.2.0 software, specifically within the /configuracao/gateway_pagamento.php component. Stored XSS occurs when malicious input is saved by the application and later rendered in web pages without proper sanitization or encoding, enabling attackers to execute arbitrary JavaScript or HTML in the context of other users' browsers. In this case, the vulnerability arises from insufficient input validation on the 'id' and 'name' parameters, which accept crafted payloads that are stored and subsequently rendered. This flaw allows attackers to inject scripts that can hijack user sessions, manipulate page content, or redirect users to malicious sites. The vulnerability does not require authentication (PR:N) but does require user interaction (UI:R), such as a victim visiting a crafted page or interface. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and low impact on confidentiality and integrity, with no impact on availability. No patches or known exploits are currently documented, but the vulnerability is publicly disclosed and should be addressed promptly. The CWE-79 classification confirms this is a classic XSS issue. Given the component affected relates to payment gateway configuration, the risk includes potential theft of sensitive payment-related information or session tokens, leading to fraud or unauthorized transactions.

Potential Impact

The primary impact of CVE-2024-53470 is on the confidentiality and integrity of user data within affected WeGIA installations. Successful exploitation can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users, particularly in the payment gateway context. This could result in financial fraud, data leakage, or reputational damage to organizations using the vulnerable software. While availability is not directly affected, the indirect consequences of compromised user trust and potential regulatory penalties can be significant. Since exploitation requires user interaction but no authentication, attackers can target a broad user base, including customers and administrators. Organizations worldwide using WeGIA v3.2.0 or similar components are at risk, especially those handling sensitive payment information. The absence of known exploits in the wild currently limits immediate widespread impact, but the public disclosure increases the likelihood of future attacks. The vulnerability's presence in a payment gateway configuration module elevates its criticality due to the sensitivity of financial operations involved.

Mitigation Recommendations

To mitigate CVE-2024-53470, organizations should first check for any official patches or updates from the WeGIA vendor and apply them immediately once available. In the absence of patches, implement strict input validation on the 'id' and 'name' parameters to reject or sanitize any suspicious or script-containing input before storage. Employ robust output encoding or context-aware escaping when rendering these parameters in web pages to prevent script execution. Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Conduct thorough code reviews and security testing focusing on all user input handling in the payment gateway configuration module. Educate users and administrators about the risks of clicking untrusted links or interacting with suspicious content. Monitor logs and web traffic for unusual activity indicative of attempted XSS exploitation. Finally, consider deploying web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the affected parameters.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-11-20T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bbeb7ef31ef0b55a8e8

Added to database: 2/25/2026, 9:38:06 PM

Last enriched: 2/26/2026, 1:44:14 AM

Last updated: 2/26/2026, 7:21:21 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats