CVE-2024-56882

Sage DPW before 2024_12_000 is vulnerable to Cross Site Scripting (XSS). Low-privileged Sage users with employee role privileges can permanently store JavaScript code in the Kurstitel and Kurzinfo input fields. The injected payload is executed for each authenticated user who views and interacts with the modified data elements.
References
Link Resource
https://cves.at/posts/cve-cve-2024-56882/writeup/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:sagedpw:sage_dpw:*:*:*:*:*:*:*:*

History

01 Oct 2025, 17:42

Type Values Removed Values Added
CPE cpe:2.3:a:sagedpw:sage_dpw:*:*:*:*:*:*:*:*
First Time Sagedpw sage Dpw
Sagedpw
References () https://cves.at/posts/cve-cve-2024-56882/writeup/ - () https://cves.at/posts/cve-cve-2024-56882/writeup/ - Exploit, Third Party Advisory

19 Feb 2025, 15:15

Type Values Removed Values Added
CWE CWE-79
Summary
  • (es) Sage DPW antes de 2024_12_000 es vulnerable a Cross Site Scripting (XSS). Los usuarios de SAGE de bajo privilegio con permisos de roles de empleados pueden almacenar permanentemente el código JavaScript en los campos de entrada Kurstitel y Kurzinfo. El payload inyectado se ejecuta para cada usuario autenticado que ve e interactúa con los elementos de datos modificados.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4

18 Feb 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-18 18:15

Updated : 2025-10-01 17:42


NVD link : CVE-2024-56882

Mitre link : CVE-2024-56882

CVE.ORG link : CVE-2024-56882


JSON object : View

Products Affected

sagedpw

  • sage_dpw
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')