Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3024: CWE-79 Improper neutralization of input during web page generation ('cross-site scripting') in Wakyma Wakyma application web

0
Medium
VulnerabilityCVE-2026-3024cvecve-2026-3024cwe-79
Published: Mon Mar 16 2026 (03/16/2026, 10:13:37 UTC)
Source: CVE Database V5
Vendor/Project: Wakyma
Product: Wakyma application web

Description

CVE-2026-3024 is a stored cross-site scripting (XSS) vulnerability in the Wakyma web application affecting all versions. It occurs in the endpoint 'vets. wakyma. com/configuracion/agenda/modelo-formulario-evento' where user input is improperly neutralized during web page generation. A user with permission to create personalized accounts can exploit this by crafting a malicious survey, potentially impacting the entire veterinary team. Additionally, low-privilege users can leverage this vulnerability to access unauthorized data and perform actions with elevated privileges. The vulnerability has a CVSS score of 4. 8, indicating medium severity, and does not require authentication or user interaction for exploitation. No known exploits are currently reported in the wild. Organizations using Wakyma, especially veterinary service providers, should prioritize mitigation to prevent unauthorized data access and privilege escalation.

AI-Powered Analysis

AILast updated: 03/16/2026, 13:50:40 UTC

Technical Analysis

CVE-2026-3024 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 found in the Wakyma web application, specifically within the endpoint 'vets.wakyma.com/configuracion/agenda/modelo-formulario-evento'. This vulnerability arises from improper neutralization of user input during web page generation, allowing malicious scripts to be stored and executed in the context of other users' browsers. The flaw can be exploited by a user with permission to create personalized accounts by submitting a crafted malicious survey, which then executes arbitrary JavaScript code when viewed by other users, including members of the veterinary team. This can lead to unauthorized actions such as session hijacking, data theft, or privilege escalation. Furthermore, even users with low privileges can exploit this vulnerability to access data beyond their authorization and perform actions with elevated privileges, indicating a significant breach of access controls. The vulnerability affects all versions of the Wakyma web application, and no patches or fixes have been published yet. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and low scope impact, resulting in a medium severity score of 4.8. No known exploits have been reported in the wild, but the potential for misuse remains significant given the application's use in veterinary service management.

Potential Impact

The impact of CVE-2026-3024 on organizations using the Wakyma web application can be substantial. Exploitation allows attackers to execute arbitrary scripts in the context of other users, leading to potential theft of sensitive information such as credentials, personal data, or veterinary records. The ability for low-privilege users to escalate privileges and access unauthorized data threatens the confidentiality and integrity of the system. This can disrupt veterinary operations, damage trust with clients, and potentially violate data protection regulations. Additionally, malicious scripts could be used to perform unauthorized actions, inject further malware, or manipulate application behavior, impacting availability indirectly. Since the vulnerability affects all versions and no patches are currently available, organizations face ongoing risk until mitigations are implemented. The medium CVSS score reflects moderate risk, but the real-world impact could be higher depending on the sensitivity of the data and the extent of user privileges within the application.

Mitigation Recommendations

To mitigate CVE-2026-3024, organizations should implement multiple layers of defense: 1) Apply strict input validation and output encoding on all user-supplied data, especially in the vulnerable endpoint, to neutralize malicious scripts before storage or rendering. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3) Enforce the principle of least privilege by reviewing and limiting user permissions, particularly the ability to create personalized accounts or surveys. 4) Conduct regular security code reviews and penetration testing focused on XSS vulnerabilities. 5) Monitor application logs and user activity for suspicious behavior indicative of exploitation attempts. 6) If possible, isolate the vulnerable functionality or disable it temporarily until a vendor patch is released. 7) Educate users and administrators about the risks of XSS and safe usage practices. 8) Engage with the vendor for timely updates and patches addressing this vulnerability. These targeted actions go beyond generic advice by focusing on the specific vulnerable endpoint and user roles involved.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2026-02-23T13:43:57.015Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b8073f9d4df451835e8b7c

Added to database: 3/16/2026, 1:35:59 PM

Last enriched: 3/16/2026, 1:50:40 PM

Last updated: 3/16/2026, 2:48:57 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses