First published: Fri Mar 28 2025(Updated: )
In MISP before 2.4.193, menu_custom_right_link_html parameters can be set via the UI (i.e., without using the CLI) and thus attackers with admin privileges can conduct XSS attacks against every page.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MISP | <2.4.193 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-58129 has a high severity due to the potential for XSS attacks by authenticated admin users.
To fix CVE-2024-58129, update MISP to version 2.4.194 or later, which addresses the vulnerability.
CVE-2024-58129 affects MISP installations prior to version 2.4.193 with admin user privileges.
CVE-2024-58129 allows attackers to perform cross-site scripting (XSS) attacks via the affected parameter.
CVE-2024-58129 requires administrative access, so exploitation is limited to authenticated users with admin privileges.