Cyber Posture

CVE-2024-48761

HighPublic PoC

Published: 29 January 2025

Published
29 January 2025
Modified
23 May 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0052 67.0th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2024-48761 is a reflected cross-site scripting (XSS) vulnerability, classified under CWE-79, in Celk Sistemas Celk Saude version 3.1.252.1. The flaw enables a remote attacker to inject arbitrary JavaScript code via the "erro" parameter, as published on 2025-01-29 with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).

The vulnerability can be exploited by any remote attacker requiring no privileges or authentication, accessible over the network with low attack complexity, though it demands user interaction such as clicking a malicious link. Successful exploitation allows high-impact consequences on confidentiality, integrity, and availability, potentially enabling attackers to steal sensitive data like session tokens, perform account takeovers, or execute other client-side attacks within the victim's browser context.

References direct to a GitHub repository at https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-48761, maintained by vulnerability researcher gabriel-bri, which contains details on the issue but no vendor-specific advisories or patch information are provided in the available data.

Details

CWE(s)
CWE-79

Affected Products

celk
celk saude
3.1.252.1

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Reflected XSS vulnerability in the web application allows remote attackers to inject and execute arbitrary JavaScript code in victims' browsers, directly enabling exploitation of public-facing applications.

References