Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-57773: n/a

0
Medium
VulnerabilityCVE-2024-57773cvecve-2024-57773
Published: Thu Jan 16 2025 (01/16/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-57773 is a medium-severity cross-site scripting (XSS) vulnerability found in the openSelectManyUserPage? orgid interface of JFinalOA versions prior to 2025. 01. 01. This flaw allows attackers with high privileges and requiring user interaction to execute arbitrary web scripts or HTML by delivering a crafted payload. The vulnerability impacts confidentiality and integrity but does not affect availability. Exploitation requires network access, elevated privileges, and user interaction, limiting its ease of exploitation. No known public exploits exist yet, and no patches have been officially released. Organizations using JFinalOA should prioritize updating to the fixed version once available and implement strict input validation and Content Security Policies to mitigate risk. Countries with significant JFinalOA usage, especially in Asia and regions with strong adoption of this software, face higher exposure.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:21:35 UTC

Technical Analysis

CVE-2024-57773 is a cross-site scripting (XSS) vulnerability identified in the openSelectManyUserPage?orgid interface of JFinalOA, an enterprise application framework. The vulnerability exists in versions prior to 2025.01.01 and allows attackers to inject and execute arbitrary web scripts or HTML content via a crafted payload. This occurs because the affected interface does not properly sanitize user-supplied input, leading to the execution of malicious scripts in the context of the victim's browser. The CVSS v3.1 score is 4.8 (medium), with an attack vector of network (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), and user interaction (UI:R). The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. The impact affects confidentiality and integrity (C:L/I:L) but not availability (A:N). No public exploits are known, and no official patches have been linked yet. The vulnerability falls under CWE-79, a common XSS weakness. Given the requirement for high privileges and user interaction, exploitation is somewhat constrained but still poses a risk, especially in environments where users have elevated access and may be tricked into interacting with malicious content.

Potential Impact

The primary impact of CVE-2024-57773 is the potential compromise of confidentiality and integrity within affected JFinalOA deployments. Successful exploitation could allow attackers to execute arbitrary scripts in the context of authenticated users with high privileges, potentially leading to session hijacking, unauthorized data access, or manipulation of application data. While availability is not impacted, the breach of confidentiality and integrity could result in data leaks, unauthorized actions, and erosion of trust in the affected systems. Organizations relying on JFinalOA for internal or external applications may face increased risk of targeted attacks, especially if attackers can craft convincing payloads that induce user interaction. The requirement for high privileges and user interaction reduces the likelihood of widespread automated exploitation but does not eliminate risk in environments with privileged users. The absence of known exploits in the wild provides a window for proactive mitigation. However, failure to address this vulnerability could lead to exploitation in targeted attacks, especially in sectors handling sensitive information or critical business processes.

Mitigation Recommendations

1. Upgrade JFinalOA to version 2025.01.01 or later once the patch is officially released to address the vulnerability. 2. Until a patch is available, implement strict input validation and output encoding on the openSelectManyUserPage?orgid interface to neutralize malicious payloads. 3. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 4. Limit the number of users with high privileges and enforce the principle of least privilege to reduce the attack surface. 5. Educate privileged users about the risks of interacting with untrusted links or payloads to mitigate social engineering vectors. 6. Monitor web application logs and user activity for signs of suspicious behavior or attempted exploitation. 7. Employ web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting the affected interface. 8. Conduct regular security assessments and penetration testing focused on input validation and XSS vulnerabilities in JFinalOA deployments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bdbb7ef31ef0b55b7b5

Added to database: 2/25/2026, 9:38:35 PM

Last enriched: 2/26/2026, 2:21:35 AM

Last updated: 2/26/2026, 6:46:08 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats