Cyber Posture

CVE-2024-54996

HighPublic PoCRCE

Published: 10 January 2025

Published
10 January 2025
Modified
07 May 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0014 32.9th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-54996 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Monicahq Monica. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique JavaScript (T1059.007); ranked at the 32.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to JavaScript (T1059.007) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 mandates input validation at application entry points, directly preventing malicious payloads in title and description parameters from being accepted and processed for client-side injection.

prevent

SI-15 requires output filtering and encoding before rendering user-supplied data in the browser, blocking XSS execution from injected content in reminders.

preventrecover

SI-2 ensures timely remediation of identified flaws like CVE-2024-54996 through patching or code fixes in MonicaHQ, eliminating the vulnerability root cause.

MITRE ATT&CK Enterprise TechniquesAI

T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
Why these techniques?

Authenticated client-side injection in reminder title/description enables arbitrary JavaScript execution (T1059.007) in victims' browsers when viewing affected pages and facilitates stealing web session cookies (T1539).

NVD Description

MonicaHQ v4.1.2 was discovered to contain multiple authenticated Client-Side Injection vulnerabilities via the title and description parameters at /people/ID/reminders/create.

Deeper analysisAI

CVE-2024-54996 is a high-severity vulnerability (CVSS 3.1 score of 8.8) affecting MonicaHQ version 4.1.2, an open-source personal relationship management tool. The flaw involves multiple authenticated client-side injection vulnerabilities, mapped to CWE-79 (Cross-Site Scripting) and CWE-94 (Code Injection), exploitable through the title and description parameters in the endpoint /people/ID/reminders/create. These injections occur on the client side, potentially allowing malicious payloads to execute in the victim's browser context.

An attacker with low-privilege authenticated access (PR:L), such as a registered user, can exploit this by submitting crafted title or description inputs when creating reminders for a person profile. Successful exploitation enables high-impact confidentiality, integrity, and availability violations (C:H/I:H/A:H), including theft of session data, manipulation of user data, or disruption of application functionality, all over the network (AV:N) with low complexity (AC:L) and no additional user interaction required (UI:N) beyond normal application use.

Advisories and related resources are available at the official MonicaHQ site (http://monicahq.com) and a GitHub repository containing proof-of-concept details (https://github.com/p314dO/CVEs/tree/main/CVE-2024-54996), published on 2025-01-10. Practitioners should review these for patch availability or workarounds in MonicaHQ updates.

Details

CWE(s)

Affected Products

monicahq
monica
4.1.2

CVEs Like This One

CVE-2026-26747Same product: Monicahq Monica
CVE-2026-40283Shared CWE-79
CVE-2026-27627Shared CWE-79
CVE-2025-24410Shared CWE-79
CVE-2026-21361Shared CWE-79
CVE-2026-34448Shared CWE-79, CWE-94
CVE-2026-34725Shared CWE-79, CWE-94
CVE-2026-42090Shared CWE-79, CWE-94
CVE-2025-8535Shared CWE-79, CWE-94
CVE-2026-34585Shared CWE-79, CWE-94

References