Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-57030: n/a

0
High
VulnerabilityCVE-2024-57030cvecve-2024-57030
Published: Fri Jan 17 2025 (01/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-57030 is a high-severity Cross Site Scripting (XSS) vulnerability affecting Wegia versions prior to 3. 2. 0. The vulnerability exists in the /geral/documentos_funcionario. php endpoint via the id parameter, allowing an attacker to inject malicious scripts. The CVSS v3. 1 score is 8. 1, indicating a significant impact on confidentiality, integrity, and availability without requiring authentication or user interaction. Although no known exploits are currently reported in the wild, the vulnerability poses a serious risk of session hijacking, data theft, or defacement. Organizations using Wegia should prioritize patching or mitigating this issue to prevent exploitation.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:13:46 UTC

Technical Analysis

CVE-2024-57030 is a Cross Site Scripting (XSS) vulnerability identified in Wegia versions earlier than 3.2.0, specifically in the /geral/documentos_funcionario.php script via the id parameter. XSS vulnerabilities arise when an application includes untrusted data in a web page without proper validation or escaping, enabling attackers to execute arbitrary JavaScript in the context of the victim's browser. This vulnerability allows remote attackers to inject malicious scripts that can compromise user sessions, steal cookies, redirect users to malicious sites, or perform actions on behalf of the user. The CVSS 3.1 score of 8.1 reflects a high severity due to the vulnerability's network attack vector (AV:N), high impact on confidentiality, integrity, and availability (C:H/I:H/A:H), and no requirement for privileges or user interaction (PR:N/UI:N). The attack complexity is high (AC:H), indicating some difficulty in exploitation, possibly due to the need for specific crafted input or conditions. No patches or fixes are currently linked, and no known exploits have been reported in the wild, but the vulnerability's presence in a web-facing component makes it a critical risk. The CWE-79 classification confirms this as a classic XSS issue, emphasizing the need for proper input sanitization and output encoding in web applications.

Potential Impact

The impact of CVE-2024-57030 on organizations worldwide can be severe. Successful exploitation can lead to the compromise of user credentials, session hijacking, unauthorized actions performed on behalf of legitimate users, and potential spread of malware through injected scripts. This can result in data breaches, loss of user trust, reputational damage, and regulatory penalties, especially if sensitive employee or organizational data is exposed. Since the vulnerability affects a web application component, it can be exploited remotely without authentication or user interaction, increasing the attack surface. Organizations relying on Wegia for employee document management or related functions may face operational disruptions and increased risk of targeted attacks. The high CVSS score underscores the critical nature of the threat, and the absence of known exploits should not lead to complacency, as attackers may develop exploits rapidly once the vulnerability is public.

Mitigation Recommendations

To mitigate CVE-2024-57030, organizations should immediately upgrade Wegia to version 3.2.0 or later once available, as this likely contains the necessary patches. In the absence of an official patch, implement strict input validation and sanitization on the id parameter in /geral/documentos_funcionario.php to neutralize malicious scripts. Employ output encoding techniques to ensure that any user-supplied data rendered in the browser is treated as data, not executable code. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block XSS attack patterns targeting this endpoint. Conduct thorough code reviews and security testing focusing on injection points. Additionally, educate users about the risks of XSS and monitor logs for suspicious activities related to the vulnerable parameter. Regularly update and patch all web-facing applications and maintain an incident response plan to quickly address potential exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bd6b7ef31ef0b55b525

Added to database: 2/25/2026, 9:38:30 PM

Last enriched: 2/26/2026, 2:13:46 AM

Last updated: 2/26/2026, 6:14:07 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats