CVE-2024-8048: CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in Progress Software Telerik Reporting
In Progress Telerik Reporting versions prior to 2024 Q3 (18.2.24.924), a code execution attack is possible using object injection via insecure expression evaluation.
AI Analysis
Technical Summary
CVE-2024-8048 is a vulnerability classified under CWE-470 (Use of Externally-Controlled Input to Select Classes or Code, also known as unsafe reflection) affecting Progress Software's Telerik Reporting versions prior to 18.2.24.924. The vulnerability arises from insecure expression evaluation that allows an attacker to perform object injection by manipulating input that controls class or code selection during runtime. This unsafe reflection can lead to arbitrary code execution within the context of the application. The vulnerability has a CVSS 3.1 base score of 7.8, indicating high severity, with the vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. This means the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), but user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no public exploits are known at this time, the vulnerability poses a serious risk because it enables remote code execution via object injection, which could allow attackers to execute arbitrary code, compromise sensitive data, alter reports, or disrupt reporting services. The vulnerability is specifically tied to the Telerik Reporting product, widely used for generating reports in .NET applications, often in enterprise environments. The insecure expression evaluation mechanism is the root cause, where user-supplied input is not properly sanitized or validated before being used in reflection-based code execution paths. The vulnerability was reserved on 2024-08-21 and published on 2024-10-09, with no patch links currently provided, indicating that remediation may require upgrading to the fixed version 18.2.24.924 or later once available.
Potential Impact
For European organizations, this vulnerability could have significant consequences, especially for those relying on Telerik Reporting for business intelligence, compliance reporting, or operational dashboards. Successful exploitation could lead to full system compromise, data breaches involving sensitive or regulated information, and disruption of critical reporting functions. This is particularly concerning for sectors such as finance, healthcare, government, and manufacturing, where reporting accuracy and data confidentiality are paramount. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, as insider threats or phishing attacks could facilitate exploitation. Additionally, compromised reporting servers could serve as pivot points for lateral movement within corporate networks. The high impact on confidentiality, integrity, and availability underscores the potential for severe operational and reputational damage. Organizations failing to promptly address this vulnerability may face regulatory penalties under GDPR if personal data is exposed or manipulated.
Mitigation Recommendations
Immediate mitigation should focus on upgrading Telerik Reporting to version 18.2.24.924 or later once the patch is available. Until then, organizations should restrict access to reporting servers to trusted users only and enforce strict input validation and sanitization on all user-supplied data used in report expressions. Disable or limit the use of dynamic expressions or reflection-based features in reports where possible. Implement application whitelisting and runtime application self-protection (RASP) to detect and block suspicious code execution attempts. Conduct thorough code reviews and penetration testing focused on expression evaluation components. Monitor logs for unusual activity related to report generation or expression evaluation. Educate users about the risks of interacting with untrusted inputs in reporting tools. Finally, maintain up-to-date backups of reporting configurations and data to enable rapid recovery in case of compromise.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2024-8048: CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in Progress Software Telerik Reporting
Description
In Progress Telerik Reporting versions prior to 2024 Q3 (18.2.24.924), a code execution attack is possible using object injection via insecure expression evaluation.
AI-Powered Analysis
Technical Analysis
CVE-2024-8048 is a vulnerability classified under CWE-470 (Use of Externally-Controlled Input to Select Classes or Code, also known as unsafe reflection) affecting Progress Software's Telerik Reporting versions prior to 18.2.24.924. The vulnerability arises from insecure expression evaluation that allows an attacker to perform object injection by manipulating input that controls class or code selection during runtime. This unsafe reflection can lead to arbitrary code execution within the context of the application. The vulnerability has a CVSS 3.1 base score of 7.8, indicating high severity, with the vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. This means the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), but user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no public exploits are known at this time, the vulnerability poses a serious risk because it enables remote code execution via object injection, which could allow attackers to execute arbitrary code, compromise sensitive data, alter reports, or disrupt reporting services. The vulnerability is specifically tied to the Telerik Reporting product, widely used for generating reports in .NET applications, often in enterprise environments. The insecure expression evaluation mechanism is the root cause, where user-supplied input is not properly sanitized or validated before being used in reflection-based code execution paths. The vulnerability was reserved on 2024-08-21 and published on 2024-10-09, with no patch links currently provided, indicating that remediation may require upgrading to the fixed version 18.2.24.924 or later once available.
Potential Impact
For European organizations, this vulnerability could have significant consequences, especially for those relying on Telerik Reporting for business intelligence, compliance reporting, or operational dashboards. Successful exploitation could lead to full system compromise, data breaches involving sensitive or regulated information, and disruption of critical reporting functions. This is particularly concerning for sectors such as finance, healthcare, government, and manufacturing, where reporting accuracy and data confidentiality are paramount. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, as insider threats or phishing attacks could facilitate exploitation. Additionally, compromised reporting servers could serve as pivot points for lateral movement within corporate networks. The high impact on confidentiality, integrity, and availability underscores the potential for severe operational and reputational damage. Organizations failing to promptly address this vulnerability may face regulatory penalties under GDPR if personal data is exposed or manipulated.
Mitigation Recommendations
Immediate mitigation should focus on upgrading Telerik Reporting to version 18.2.24.924 or later once the patch is available. Until then, organizations should restrict access to reporting servers to trusted users only and enforce strict input validation and sanitization on all user-supplied data used in report expressions. Disable or limit the use of dynamic expressions or reflection-based features in reports where possible. Implement application whitelisting and runtime application self-protection (RASP) to detect and block suspicious code execution attempts. Conduct thorough code reviews and penetration testing focused on expression evaluation components. Monitor logs for unusual activity related to report generation or expression evaluation. Educate users about the risks of interacting with untrusted inputs in reporting tools. Finally, maintain up-to-date backups of reporting configurations and data to enable rapid recovery in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ProgressSoftware
- Date Reserved
- 2024-08-21T17:18:57.546Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690908577fff0e30cee23a1f
Added to database: 11/3/2025, 7:53:59 PM
Last enriched: 11/3/2025, 8:08:43 PM
Last updated: 11/4/2025, 7:29:04 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-20749: CWE-121 Stack Overflow in MediaTek, Inc. MT6789, MT6835, MT6855, MT6878, MT6879, MT6886, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8169, MT8188, MT8195, MT8196, MT8781, MT8796
HighCVE-2025-20748: CWE-120 Classic Buffer Overflow in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
HighCVE-2025-20747: CWE-121 Stack Overflow in MediaTek, Inc. MT2718, MT2737, MT6835, MT6878, MT6886, MT6897, MT6899, MT6982, MT6985, MT6986, MT6986D, MT6989, MT6990, MT6991, MT8676, MT8678, MT8755, MT8893
HighCVE-2025-20746: CWE-121 Stack Overflow in MediaTek, Inc. MT2718, MT2737, MT6835, MT6878, MT6886, MT6897, MT6899, MT6982, MT6985, MT6986, MT6986D, MT6989, MT6990, MT6991, MT8676, MT8678, MT8755, MT8893
HighCVE-2025-20745: CWE-416 Use After Free in MediaTek, Inc. MT2718, MT6989, MT6991, MT8370, MT8390, MT8395, MT8676, MT8678, MT87920
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.