CVE-2024-34710
CVE-2024-34710: A client-side template injection vulnerability exists in Wiki.js versions prior to 2.5.303. This allows attackers to inject malicious JavaScript into page content, executing when a victim views the page. The vulnerability stems from injecting invalid HTML tags with a template injection payload.
The SVRS score of 30 indicates a low level of risk, however, the tag "In The Wild" suggests that although the likelihood is low, exploitation may have already occurred. While not immediately critical, patching to version 2.5.303 is recommended to mitigate potential data theft or unauthorized actions on user accounts. This issue is significant because it demonstrates the risk of combining even seemingly harmless vulnerabilities, such as improper handling of template injection, with other code flaws to create more dangerous attacks. Prioritizing an upgrade will reduce the risk.
Description
CVE-2024-34710 is a client-side template injection vulnerability in Wiki.js, a wiki app built on Node.js. This vulnerability allows an attacker to inject malicious JavaScript into the content section of pages, which would execute when a victim loads the page containing the payload. The vulnerability is fixed in version 2.5.303.
Key Insights
- The SVRS of 34 indicates a moderate risk, highlighting the need for attention and monitoring.
- The vulnerability allows attackers to inject malicious JavaScript into wiki pages, potentially leading to phishing attacks, malware distribution, or data theft.
- The vulnerability is relatively easy to exploit, as it only requires the injection of an invalid HTML tag with a template injection payload.
Mitigation Strategies
- Update Wiki.js to version 2.5.303 or later.
- Implement input validation and sanitization to prevent the injection of malicious code.
- Use a web application firewall (WAF) to block malicious requests.
- Monitor logs for suspicious activity and investigate any potential exploitation attempts.
Additional Information
- Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
- Exploit Status: No active exploits have been published.
- CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.
- In the Wild: There is no evidence that this vulnerability is being actively exploited in the wild.
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.