CVE-2024-13918
Published: 10 March 2025
Summary
CVE-2024-13918 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Laravel Framework. Its CVSS base score is 8.0 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious Link (T1204.001); ranked in the top 22.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely flaw remediation by applying the Laravel 11.36.0 patch that fixes improper encoding of request parameters on debug error pages.
Enforces secure configuration settings to disable debug mode in production, preventing generation of vulnerable error pages reflecting unencoded request parameters.
Mandates filtering and encoding of information outputs like request parameters on error pages to block reflected XSS payloads.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Reflected XSS via crafted link enables user execution of malicious link (T1204.001) and directly facilitates browser session hijacking through arbitrary script execution (T1185).
NVD Description
The Laravel framework versions between 11.9.0 and 11.35.1 are susceptible to reflected cross-site scripting due to an improper encoding of request parameters in the debug-mode error page.
Deeper analysisAI
CVE-2024-13918 is a reflected cross-site scripting vulnerability (CWE-79) affecting the Laravel framework in versions 11.9.0 through 11.35.1. The issue arises from improper encoding of request parameters when displayed on the debug-mode error page, enabling malicious scripts to be reflected back to users. It carries a CVSS v3.1 base score of 8.0 (AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N) and was published on 2025-03-10.
Attackers can exploit this over the network without requiring privileges, though it demands high complexity and user interaction, such as clicking a crafted link. By inducing an error in debug mode, an attacker can inject and reflect XSS payloads via request parameters, achieving high impacts on confidentiality and integrity with a changed scope, potentially allowing session hijacking or arbitrary script execution in the victim's browser.
Patches are available in Laravel framework version 11.36.0, addressing the flaw through pull request #53869 on GitHub. Further mitigation details appear in the SBA Research advisory (SBA-ADV-20241209-01) and the oss-security mailing list discussion from March 10, 2025.
Details
- CWE(s)