Cyber Posture

CVE-2024-13919

HighPublic PoC

Published: 10 March 2025

Published
10 March 2025
Modified
24 March 2025
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
EPSS Score 0.0025 48.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.

Security Summary

CVE-2024-13919 is a reflected cross-site scripting (XSS) vulnerability affecting the Laravel framework in versions 11.9.0 through 11.35.1. The issue stems from improper encoding of route parameters when displayed on the debug-mode error page, allowing malicious scripts to be injected and executed. It carries a CVSS v3.1 base score of 8.0 (AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N) and maps to CWE-79.

An unauthenticated remote attacker can exploit this vulnerability by tricking a user into accessing a specially crafted URL that triggers an error page in debug mode. The unencoded route parameter reflects the attacker's payload, enabling script execution in the victim's browser context with high confidentiality and integrity impacts, such as session hijacking or data theft, though it requires user interaction and high attack complexity.

Mitigation involves upgrading to Laravel framework version 11.36.0 or later, where the fix is implemented via pull request #53869 on GitHub. Further details on the vulnerability and remediation are provided in the SBA advisory at sbaresearch GitHub and the oss-security mailing list announcement.

Details

CWE(s)
CWE-79

Affected Products

laravel
framework
11.9.0 — 11.36.0

MITRE ATT&CK Enterprise Techniques

T1566.002 Spearphishing Link Initial Access
Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

Reflected XSS via crafted URL enables spearphishing link delivery (T1566.002) and facilitates browser session hijacking or cookie theft for data/session impacts (T1185).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References