Cyber Posture

CVE-2024-13918

HighPublic PoC

Published: 10 March 2025

Published
10 March 2025
Modified
24 March 2025
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
EPSS Score 0.0105 77.7th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-13918 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Laravel Framework. Its CVSS base score is 8.0 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious Link (T1204.001); ranked in the top 22.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Malicious Link (T1204.001) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely flaw remediation by applying the Laravel 11.36.0 patch that fixes improper encoding of request parameters on debug error pages.

prevent

Enforces secure configuration settings to disable debug mode in production, preventing generation of vulnerable error pages reflecting unencoded request parameters.

prevent

Mandates filtering and encoding of information outputs like request parameters on error pages to block reflected XSS payloads.

MITRE ATT&CK Enterprise TechniquesAI

T1204.001 Malicious Link Execution
An adversary may rely upon a user clicking a malicious link in order to gain execution.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

Reflected XSS via crafted link enables user execution of malicious link (T1204.001) and directly facilitates browser session hijacking through arbitrary script execution (T1185).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The Laravel framework versions between 11.9.0 and 11.35.1 are susceptible to reflected cross-site scripting due to an improper encoding of request parameters in the debug-mode error page.

Deeper analysisAI

CVE-2024-13918 is a reflected cross-site scripting vulnerability (CWE-79) affecting the Laravel framework in versions 11.9.0 through 11.35.1. The issue arises from improper encoding of request parameters when displayed on the debug-mode error page, enabling malicious scripts to be reflected back to users. It carries a CVSS v3.1 base score of 8.0 (AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N) and was published on 2025-03-10.

Attackers can exploit this over the network without requiring privileges, though it demands high complexity and user interaction, such as clicking a crafted link. By inducing an error in debug mode, an attacker can inject and reflect XSS payloads via request parameters, achieving high impacts on confidentiality and integrity with a changed scope, potentially allowing session hijacking or arbitrary script execution in the victim's browser.

Patches are available in Laravel framework version 11.36.0, addressing the flaw through pull request #53869 on GitHub. Further mitigation details appear in the SBA Research advisory (SBA-ADV-20241209-01) and the oss-security mailing list discussion from March 10, 2025.

Details

CWE(s)

Affected Products

laravel
framework
11.9.0 — 11.36.0

CVEs Like This One

CVE-2024-13919Same product: Laravel Framework
CVE-2025-27515Same product: Laravel Framework
CVE-2025-28899Shared CWE-79
CVE-2025-28924Shared CWE-79
CVE-2026-25018Shared CWE-79
CVE-2025-23520Shared CWE-79
CVE-2025-24686Shared CWE-79
CVE-2025-22332Shared CWE-79
CVE-2025-68880Shared CWE-79
CVE-2025-12551Shared CWE-79

References