CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-34710

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.00142/1

CVE-2024-34710: A client-side template injection vulnerability exists in Wiki.js versions prior to 2.5.303. This allows attackers to inject malicious JavaScript into page content, executing when a victim views the page. The vulnerability stems from injecting invalid HTML tags with a template injection payload.

The SVRS score of 30 indicates a low level of risk, however, the tag "In The Wild" suggests that although the likelihood is low, exploitation may have already occurred. While not immediately critical, patching to version 2.5.303 is recommended to mitigate potential data theft or unauthorized actions on user accounts. This issue is significant because it demonstrates the risk of combining even seemingly harmless vulnerabilities, such as improper handling of template injection, with other code flaws to create more dangerous attacks. Prioritizing an upgrade will reduce the risk.

In The Wild
2024-05-20

2024-05-21
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-34710 is a client-side template injection vulnerability in Wiki.js, a wiki app built on Node.js. This vulnerability allows an attacker to inject malicious JavaScript into the content section of pages, which would execute when a victim loads the page containing the payload. The vulnerability is fixed in version 2.5.303.

Key Insights

  • The SVRS of 34 indicates a moderate risk, highlighting the need for attention and monitoring.
  • The vulnerability allows attackers to inject malicious JavaScript into wiki pages, potentially leading to phishing attacks, malware distribution, or data theft.
  • The vulnerability is relatively easy to exploit, as it only requires the injection of an invalid HTML tag with a template injection payload.

Mitigation Strategies

  • Update Wiki.js to version 2.5.303 or later.
  • Implement input validation and sanitization to prevent the injection of malicious code.
  • Use a web application firewall (WAF) to block malicious requests.
  • Monitor logs for suspicious activity and investigate any potential exploitation attempts.

Additional Information

  • Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
  • Exploit Status: No active exploits have been published.
  • CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.
  • In the Wild: There is no evidence that this vulnerability is being actively exploited in the wild.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-34710 | requarks wiki up to 2.5.302 Template Wiki.js special elements used in a template engine (GHSA-xjcj-p2qv-q3rf)
vuldb.com2024-05-21
CVE-2024-34710 | requarks wiki up to 2.5.302 Template Wiki.js special elements used in a template engine (GHSA-xjcj-p2qv-q3rf) | A vulnerability was found in requarks wiki up to 2.5.302. It has been declared as problematic. This vulnerability affects unknown code of the file Wiki.js of the component Template Handler. The manipulation leads to improper neutralization of special elements used in a template engine. This vulnerability was
cve-2024-34710
domains
urls
cves

Social Media

#Vulnerability #CVE202434710 CVE-2024-34710: Wiki.js Vulnerability Exposes Users to Potential Account Takeover https://t.co/rVzGRyMWE0
0
0
0
CVE-2024-34710: Wiki.js Vulnerability Exposes Users to Potential Account Takeover https://t.co/anZzwj5Qhb
1
1
1
#Wiki.js, a popular open-source wiki engine, has patched a #vulnerability that could have allowed attackers to inject malicious code and potentially compromise user accounts. CVE-2024-34710 poses a serious risk due to its potential for stored #XSS attacks https://t.co/WYAOVOhder
0
0
0
🗣 CVE-2024-34710: Wiki.js Vulnerability Exposes Users to Potential Account Takeover https://t.co/vg9GUaGSUb #security #cybernews #cybersecurity #fridaysecurity #linkedin #twitter #telegram
0
0
0
CVE-2024-34710 Wiki.js is al wiki app built on Node.js. Client side template injection was discovered, that could allow an attacker to inject malicious JavaScript into the content s… https://t.co/XNHBqzDL7E
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://github.com/requarks/wiki/commit/1238d614e1599fefadd4614ee4b5797a087f50ac
[email protected]https://github.com/requarks/wiki/security/advisories/GHSA-xjcj-p2qv-q3rf
GITHUBhttps://github.com/requarks/wiki/security/advisories/GHSA-xjcj-p2qv-q3rf

CWE Details

CWE IDCWE NameDescription
CWE-1336Improper Neutralization of Special Elements Used in a Template EngineThe product uses a template engine to insert or process externally-influenced input, but it does not neutralize or incorrectly neutralizes special elements or syntax that can be interpreted as template expressions or other code directives when processed by the engine.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence