CVE-2024-58319
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-18

Last updated on: 2025-12-27

Assigner: VulnCheck

Description
A reflected cross-site scripting vulnerability in Kentico Xperience allows attackers to inject malicious scripts via the Pages dashboard widget configuration dialog. Attackers can exploit this vulnerability to execute malicious scripts in administrative users' browsers.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-18
Last Modified
2025-12-27
Generated
2026-05-07
AI Q&A
2025-12-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
kentico xperience to 13.0.160 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2024-58319 is a reflected cross-site scripting (XSS) vulnerability in Kentico Xperience versions up to 13.0.160. It occurs in the Pages dashboard widget configuration dialog due to improper input neutralization, allowing attackers to inject malicious scripts. When exploited, these scripts execute in the browsers of administrative users, potentially compromising their accounts or the system. [1]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to execute arbitrary malicious scripts in the browsers of administrative users. This can lead to compromise of administrative accounts or the overall system, potentially resulting in unauthorized access or control. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, apply the hotfix available from Kentico DevNet for Kentico Xperience versions up to and including 13.0.160. This patch addresses the reflected XSS issue in the Pages dashboard widget configuration dialog. Additionally, restrict administrative access and educate users to be cautious of unexpected inputs or links that could trigger the vulnerability. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart