CVE-2024-57030
Published: 17 January 2025
Summary
CVE-2024-57030 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Wegia Wegia. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 28.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates XSS by validating the id parameter in /geral/documentos_funcionario.php to prevent injection of malicious scripts.
Prevents execution of injected scripts by filtering and encoding information outputs from the vulnerable endpoint.
Addresses the specific flaw in Wegia < 3.2.0 by requiring timely remediation through patching to version 3.2.0 or later.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The reflected XSS vulnerability enables exploitation of a public-facing web application (T1190) and facilitates stealing web session cookies from authenticated users via injected JavaScript (T1539).
NVD Description
Wegia < 3.2.0 is vulnerable to Cross Site Scripting (XSS) in /geral/documentos_funcionario.php via the id parameter.
Deeper analysisAI
Wegia versions prior to 3.2.0 contain a Cross-Site Scripting (XSS) vulnerability in the /geral/documentos_funcionario.php component, exploitable through the id parameter. Tracked as CVE-2024-57030 and published on 2025-01-17, this issue corresponds to CWE-79 and carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Remote attackers require no privileges to exploit this vulnerability over the network, though it demands high attack complexity and no user interaction. Successful exploitation enables high-impact consequences on confidentiality, integrity, and availability within the affected application.
Mitigation involves upgrading to Wegia 3.2.0 or later. Additional details, including proof-of-concept exploits, are documented in the research repository at https://github.com/nmmorette/vulnerability-research/tree/main/CVE-2024-57030, with the official project site available at https://www.wegia.org/.
Details
- CWE(s)