CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-54001

Medium Severity
Kanboard
SVRS
30/100

CVSSv3
5.5/10

EPSS
0.00014/1

CVE-2024-54001 is a stored Cross-Site Scripting (XSS) vulnerability in Kanboard project management software. This HTML injection flaw exists within the application settings, specifically affecting fields like application_language, application_date_format, application_timezone, and application_time_format. User-supplied input isn't properly sanitized, allowing for arbitrary HTML injection. While the CVSS score is 5.5, indicating a medium severity, the SOCRadar Vulnerability Risk Score (SVRS) is 30, suggesting a lower level of immediate risk. Successful exploitation could lead to malicious JavaScript execution within the application, potentially bypassing Content Security Policy (CSP) and compromising user sessions. This vulnerability is addressed in Kanboard version 1.2.41, making updating to this version crucial to mitigate potential security risks associated with this issue. Users of Kanboard should upgrade to the latest version to protect against potential attacks.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:H
UI:N
S:C
C:L
I:L
A:N
2024-12-05

2025-03-10
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-54001 is a newly disclosed vulnerability with a limited description currently available. While its CVSS score is 0, indicating a lack of information for quantitative assessment, SOCRadar's SVRS (Vulnerability Risk Score) has assigned a score of 30, suggesting a moderate risk. Furthermore, the vulnerability is tagged as "In The Wild," implying it is actively exploited by hackers.

Key Insights

  • Limited Information: Due to the recent discovery and lack of detailed information, CVE-2024-54001 remains shrouded in uncertainty. The absence of a comprehensive description makes it difficult to fully comprehend its impact and potential exploit methods.
  • Active Exploitation: The "In The Wild" tag underscores the urgency of addressing this vulnerability. Hackers are actively using it for malicious purposes, indicating a real and immediate threat.
  • Potential for High Impact: While the SVRS score of 30 might not seem critical, the "In The Wild" status implies that it could potentially be exploited for high-impact attacks, especially considering the lack of detailed information about its nature and exploit techniques.

Mitigation Strategies

  • Immediate Patching and Updates: Given the vulnerability's active exploitation, prioritize patching and updating affected systems as soon as possible. This is crucial to eliminate the vulnerability's exploitable weaknesses.
  • Increased Monitoring and Threat Detection: Enhance security monitoring for suspicious activities and potential exploitation attempts related to this vulnerability. Implementing intrusion detection systems (IDS) and other security tools can be beneficial.
  • Vulnerability Scanning and Assessment: Conduct thorough vulnerability scans to identify affected systems within your environment. This will help in prioritizing remediation efforts and ensuring comprehensive protection.
  • Security Awareness Training: Educating users about the importance of security and the potential risks associated with this vulnerability is essential. This will help prevent them from falling victim to social engineering attacks that might target this specific vulnerability.

Additional Information

For further details on CVE-2024-54001 and potential mitigation strategies, we encourage you to utilize the "Ask to Analyst" feature within SOCRadar's platform, contact SOCRadar directly, or open a support ticket.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-54001 | Kanboard up to 1.2.40 Setting cross site scripting (GHSA-4vvp-jf72-chrj)
vuldb.com2025-02-21
CVE-2024-54001 | Kanboard up to 1.2.40 Setting cross site scripting (GHSA-4vvp-jf72-chrj) | A vulnerability classified as problematic has been found in Kanboard up to 1.2.40. Affected is an unknown function of the component Setting Handler. The manipulation of the argument application_language/application_date_format/application_timezone/application_time_format leads to basic cross site scripting. This vulnerability is traded as CVE-2024-54001</a
vuldb.com
rss
forum
news

Social Media

CVE-2024-54001 Stored XSS Vulnerability in Kanboard Settings Fixed in 1.2.41 Kanboard is a project management tool using the Kanban method. It has a vulnerability where HTML can be injected into the application s... https://t.co/Kifu0snrqG
0
0
0
CVE-2024-54001 Kanboard is project management software that focuses on the Kanban methodology. HTML can be injected and stored into the application settings section. The fields appl… https://t.co/V8v9YX00Jh
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
AppKanboardkanboard

References

ReferenceLink
[email protected]https://github.com/kanboard/kanboard/security/advisories/GHSA-4vvp-jf72-chrj
GITHUBhttps://github.com/kanboard/kanboard/security/advisories/GHSA-4vvp-jf72-chrj

CWE Details

CWE IDCWE NameDescription
CWE-80Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)The software receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as &lt;, &gt;, and &amp; that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.
CWE-79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence