Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-56376: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Vanderbilt REDCap

0
Medium
VulnerabilityCVE-2024-56376cvecve-2024-56376cwe-79
Published: Thu Jan 09 2025 (01/09/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Vanderbilt
Product: REDCap

Description

CVE-2024-56376 is a stored cross-site scripting (XSS) vulnerability in the built-in messenger of Vanderbilt REDCap version 14. 9. 6. Authenticated users can inject malicious scripts into message fields, which execute when recipients click the crafted message. This vulnerability allows limited arbitrary script execution within the context of the victim's browser session. Exploitation requires user interaction and authenticated access, with a medium CVSS score of 5. 4. The flaw impacts confidentiality and integrity but does not affect availability. No known public exploits have been reported yet. Organizations using REDCap 14.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:13:00 UTC

Technical Analysis

CVE-2024-56376 is a stored cross-site scripting (XSS) vulnerability identified in the built-in messenger component of Vanderbilt's REDCap software, specifically version 14.9.6. REDCap is widely used for electronic data capture in research and clinical environments. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing authenticated users to inject malicious JavaScript code into the message field. When a recipient clicks on the crafted message, the malicious script executes in their browser context, potentially enabling actions such as session hijacking, credential theft, or unauthorized actions within the REDCap application. The vulnerability requires the attacker to have authenticated access to the system and the victim to interact with the malicious message, which limits the attack vector but does not eliminate risk. The CVSS 3.1 base score is 5.4 (medium severity), reflecting network attack vector, low attack complexity, required privileges, and user interaction. The scope is changed (S:C), indicating the vulnerability can affect resources beyond the vulnerable component. No public exploits are currently known, but the vulnerability's presence in a critical research data management tool makes it a significant concern. No official patches or mitigation links are provided yet, emphasizing the need for vigilance and interim protective measures.

Potential Impact

The impact of CVE-2024-56376 primarily affects confidentiality and integrity within REDCap environments. Successful exploitation can lead to execution of arbitrary scripts in the context of authenticated users, potentially allowing attackers to steal session tokens, manipulate data, or perform unauthorized actions on behalf of victims. This can compromise sensitive research and clinical data, undermining trust and compliance with data protection regulations such as HIPAA or GDPR. Although availability is not directly impacted, the breach of confidentiality and integrity can have severe operational and reputational consequences. Organizations relying on REDCap for critical research data management, especially in healthcare, academic, and clinical trial settings, face increased risk of data leakage and manipulation. The requirement for authentication and user interaction reduces the likelihood of widespread automated exploitation but does not eliminate targeted attacks, especially insider threats or compromised user accounts. The vulnerability's presence in a widely used platform means many institutions worldwide could be affected if not remediated promptly.

Mitigation Recommendations

To mitigate CVE-2024-56376, organizations should first verify if they are running REDCap version 14.9.6 and plan an immediate upgrade to a patched version once available from Vanderbilt. In the absence of an official patch, administrators should restrict messenger functionality to trusted users only and monitor message content for suspicious scripts or payloads. Implementing strict Content Security Policy (CSP) headers can help limit the execution of unauthorized scripts within REDCap. Additionally, enforcing multi-factor authentication (MFA) reduces the risk of compromised accounts being used to inject malicious messages. User training to recognize suspicious messages and avoid clicking untrusted links is critical. Regularly auditing user activity logs for unusual messaging behavior can help detect exploitation attempts early. Network segmentation and limiting REDCap access to trusted networks further reduce exposure. Finally, coordinate with Vanderbilt support and subscribe to security advisories for timely updates and patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bd4b7ef31ef0b55b427

Added to database: 2/25/2026, 9:38:28 PM

Last enriched: 2/26/2026, 2:13:00 AM

Last updated: 2/26/2026, 8:06:01 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats