Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-57488: n/a

0
Medium
VulnerabilityCVE-2024-57488cvecve-2024-57488
Published: Mon Jan 13 2025 (01/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Code-Projects Online Car Rental System 1.0 is vulnerable to Cross Site Scripting (XSS) via the vehicalorcview parameter in /admin/edit-vehicle.php.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 00:04:36 UTC

Technical Analysis

CVE-2024-57488 identifies a Cross Site Scripting (XSS) vulnerability in the Code-Projects Online Car Rental System version 1.0. The vulnerability is located in the vehicalorcview parameter of the /admin/edit-vehicle.php endpoint. This parameter does not properly sanitize or encode user-supplied input, allowing an attacker to inject malicious JavaScript code. When an administrator accesses the affected page with a crafted URL or input, the injected script executes in their browser context. This can lead to theft of session cookies, enabling session hijacking, or performing unauthorized administrative actions by leveraging the admin's privileges. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 6.5 (medium severity), reflecting the network attack vector, low complexity, no privileges required, and no user interaction needed, but limited impact on availability and only partial impact on confidentiality and integrity. No patches or fixes have been published yet, and no known exploits are reported in the wild. The vulnerability corresponds to CWE-79, a common web application security weakness involving improper neutralization of input during web page generation.

Potential Impact

The primary impact of CVE-2024-57488 is on the confidentiality and integrity of the affected system. An attacker exploiting this XSS vulnerability can execute arbitrary scripts in the context of an administrator's browser session, potentially stealing session tokens or cookies, leading to session hijacking. This could allow unauthorized access to the admin panel, enabling further malicious activities such as data manipulation or unauthorized configuration changes. Although availability is not directly affected, the compromise of administrative accounts can lead to broader system disruptions. Organizations using this vulnerable car rental system risk unauthorized disclosure of sensitive data and loss of control over their administrative interfaces. The ease of exploitation without authentication or user interaction increases the threat level, especially in environments where administrators access the system from untrusted networks or without additional security controls like multi-factor authentication.

Mitigation Recommendations

To mitigate CVE-2024-57488, organizations should implement strict input validation and output encoding on the vehicalorcview parameter to neutralize any injected scripts. Employing a robust web application firewall (WAF) configured to detect and block XSS payloads targeting this parameter can provide immediate protection. Administrators should be trained to avoid clicking on suspicious links and to use browsers with XSS protection enabled. Enforcing multi-factor authentication (MFA) for admin access can reduce the impact of session hijacking. Regularly monitoring logs for unusual admin activity and scanning the application with automated security tools to detect XSS vulnerabilities is recommended. Since no official patch is available, consider applying custom patches or using security middleware to sanitize inputs. Finally, coordinate with the software vendor or community to obtain or develop an official fix and apply it promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bd6b7ef31ef0b55b5b3

Added to database: 2/25/2026, 9:38:30 PM

Last enriched: 2/28/2026, 12:04:36 AM

Last updated: 4/12/2026, 3:43:40 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses