CVE-2024-51229
Published: 09 January 2025
Summary
CVE-2024-51229 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Pb-Cms Project Pb-Cms. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 16.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 mandates timely patching and remediation of the specific XSS flaw in the pb-cms theme management function.
SI-10 requires validation of user inputs to the theme management function to block malicious script injection.
SI-15 enforces output filtering when rendering themes to prevent execution of injected XSS payloads.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
XSS in public-facing CMS admin/theme function directly enables remote exploitation of the web application for code execution in user context.
NVD Description
Cross Site Scripting vulnerability in LinZhaoguan pb-cms v.2.0 allows a remote attacker to execute arbitrary code via the theme management function.
Deeper analysisAI
CVE-2024-51229 is a Cross-Site Scripting (XSS) vulnerability, mapped to CWE-79, affecting LinZhaoguan pb-cms version 2.0. The issue exists in the theme management function, where a remote attacker can execute arbitrary code.
With a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), the vulnerability can be exploited by a remote attacker requiring no privileges over the network with low attack complexity, though user interaction is necessary. Successful exploitation enables high-impact effects on confidentiality, integrity, and availability, allowing arbitrary code execution.
Mitigation details are provided in the advisory at https://gitee.com/LinZhaoguan/pb-cms/issues/IAYHUP.
Details
- CWE(s)