Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-54675: n/a

0
Medium
VulnerabilityCVE-2024-54675cvecve-2024-54675
Published: Wed Dec 04 2024 (12/04/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

app/webroot/js/workflows-editor/workflows-editor.js in MISP through 2.5.2 has stored XSS in the editor interface for an ad-hoc workflow.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:22:52 UTC

Technical Analysis

CVE-2024-54675 is a stored cross-site scripting (XSS) vulnerability identified in the MISP (Malware Information Sharing Platform & Threat Sharing) software, specifically in the JavaScript file app/webroot/js/workflows-editor/workflows-editor.js. This vulnerability affects MISP versions through 2.5.2 and resides in the editor interface used for creating or modifying ad-hoc workflows. Stored XSS occurs when malicious input is saved by the application and later rendered in a way that executes the injected script in the context of other users' browsers. In this case, an attacker can craft malicious payloads that, when stored in the workflow editor, will execute when a user loads or interacts with the affected interface. The vulnerability does not require any privileges or authentication, but it does require user interaction (such as viewing or editing the workflow). The CVSS 3.1 base score is 6.1, indicating medium severity, with the vector string AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. This means the attack can be launched remotely over the network with low complexity, no privileges, but requires user interaction. The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. The impact on confidentiality and integrity is low, with no impact on availability. Currently, no known exploits are reported in the wild, and no official patches or fixes have been linked or published yet. Given MISP's role in threat intelligence sharing, this vulnerability could be leveraged to execute malicious scripts that steal session tokens, manipulate displayed data, or perform actions on behalf of authenticated users, potentially undermining trust in the platform.

Potential Impact

The primary impact of CVE-2024-54675 is the potential for attackers to execute arbitrary JavaScript in the browsers of users interacting with the vulnerable MISP workflows editor. This can lead to theft of session cookies, unauthorized actions performed on behalf of users, and manipulation or corruption of displayed threat intelligence data. Since MISP is widely used by security teams, government agencies, and private organizations for sharing sensitive threat information, exploitation could result in leakage of confidential intelligence or disruption of collaborative workflows. The vulnerability does not directly affect system availability but can undermine data integrity and confidentiality. Because no authentication or privileges are required to inject the malicious payload, and only user interaction is needed, the attack surface is broad. However, the requirement for user interaction and the medium severity score indicate that exploitation is not trivial but feasible. Organizations relying on MISP for critical threat intelligence sharing may face increased risk of targeted attacks aiming to compromise user sessions or inject misleading information into workflows, potentially impacting incident response and security operations.

Mitigation Recommendations

Until an official patch is released, organizations should implement several specific mitigations to reduce risk from CVE-2024-54675. First, restrict access to the MISP workflows editor interface to trusted users only, using network segmentation, VPNs, or IP whitelisting to limit exposure. Second, enforce strict input validation and sanitization on all user inputs in the workflows editor, if possible via custom configurations or temporary code modifications, to prevent malicious script injection. Third, educate users to be cautious when interacting with ad-hoc workflows, especially those created by untrusted sources, and to report suspicious behavior. Fourth, enable Content Security Policy (CSP) headers on the MISP web server to restrict execution of inline scripts and loading of untrusted resources, mitigating the impact of injected scripts. Fifth, monitor logs and user activity for unusual patterns that may indicate exploitation attempts. Finally, stay updated with MISP vendor announcements and apply patches promptly once available. If feasible, consider deploying web application firewalls (WAFs) with rules targeting XSS payloads in the workflows editor endpoints to provide an additional layer of defense.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bc4b7ef31ef0b55acc5

Added to database: 2/25/2026, 9:38:12 PM

Last enriched: 2/28/2026, 3:22:52 AM

Last updated: 4/12/2026, 7:44:01 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses