Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-55342: n/a

0
Medium
VulnerabilityCVE-2024-55342cvecve-2024-55342
Published: Fri Dec 20 2024 (12/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A file upload functionality in Piranha CMS 11.1 allows authenticated remote attackers to upload a crafted PDF file to /manager/media. This PDF can contain malicious JavaScript code, which is executed when a victim user opens or interacts with the PDF in their web browser, leading to a XSS vulnerability.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 02:04:30 UTC

Technical Analysis

CVE-2024-55342 is a vulnerability identified in Piranha CMS version 11.1 involving the file upload functionality at the /manager/media endpoint. Authenticated remote attackers can exploit this flaw by uploading a specially crafted PDF file that contains embedded malicious JavaScript code. When a user with access to the CMS media manager opens or interacts with this PDF in their web browser, the JavaScript executes, leading to a cross-site scripting (XSS) vulnerability classified under CWE-79. The vulnerability arises because the CMS does not adequately sanitize or validate the content of uploaded PDF files, allowing script injection within the PDF context. The attack requires the attacker to have valid authentication credentials, and the victim must interact with the malicious PDF for the exploit to succeed. The CVSS 3.1 base score is 4.7 (medium severity), reflecting network attack vector, low attack complexity, no privileges required for the attacker, but requiring user interaction and resulting in limited confidentiality impact without affecting integrity or availability. No patches or known exploits are currently available, indicating that the vulnerability is newly disclosed. This vulnerability could be leveraged to steal session tokens, perform actions on behalf of the victim, or conduct phishing attacks within the CMS environment. The scope is limited to users who have access to the media manager and open the malicious PDF, but the impact on confidentiality can be significant if sensitive session or user data is exposed.

Potential Impact

The primary impact of CVE-2024-55342 is the potential compromise of user confidentiality through cross-site scripting attacks within the Piranha CMS environment. Attackers with valid credentials can upload malicious PDFs that execute JavaScript in the context of the victim’s browser session, potentially stealing session cookies, performing unauthorized actions, or delivering further payloads. This can lead to account takeover, unauthorized content modification, or lateral movement within the CMS. Since the vulnerability requires authentication and user interaction, the attack surface is somewhat limited to internal users or trusted collaborators, but insider threats or compromised accounts could be leveraged. Organizations relying on Piranha CMS for content management, especially those with multiple administrators or editors, face risks of data leakage and operational disruption. The absence of patches increases exposure time, and the lack of known exploits suggests the vulnerability is not yet widely weaponized, but proactive mitigation is critical. The impact on integrity and availability is minimal, but confidentiality breaches can have downstream effects on organizational security posture and trust.

Mitigation Recommendations

To mitigate CVE-2024-55342, organizations should implement strict access controls on the /manager/media upload functionality, limiting upload permissions to only highly trusted users. Employ file type validation and content inspection to detect and block PDFs containing embedded scripts or suspicious elements before upload acceptance. Use sandboxing or isolated environments for previewing uploaded files to prevent script execution in user browsers. Educate CMS users about the risks of opening untrusted or unexpected PDF files, especially those uploaded by other users. Monitor CMS logs for unusual upload activity or access patterns indicative of exploitation attempts. Until an official patch is released, consider disabling PDF uploads or restricting file uploads to safer formats. Regularly update Piranha CMS and subscribe to vendor advisories for timely patch deployment. Additionally, implement Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting script execution contexts within the CMS web interface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-06T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bceb7ef31ef0b55b103

Added to database: 2/25/2026, 9:38:22 PM

Last enriched: 2/26/2026, 2:04:30 AM

Last updated: 4/12/2026, 10:12:55 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses