VYPR
Moderate severityNVD Advisory· Published Jul 16, 2025· Updated Jul 16, 2025

CVE-2024-10032

CVE-2024-10032

Description

In Eclipse GlassFish version 7.0.15 is possible to perform Stored Cross-site scripting attacks in the Administration Console.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Eclipse GlassFish 7.0.15 Administration Console allows stored XSS via crafted input, enabling session hijacking or admin impersonation.

Description

Eclipse GlassFish versions up to 7.0.15 contain a stored cross-site scripting (XSS) vulnerability in the Administration Console. [1] The vulnerability arises because user-supplied input is not properly sanitized before being stored and later rendered in the administrative interface. An attacker can inject arbitrary HTML or JavaScript code into configuration pages, such as standaloneInstanceConfigProperties.jsf. [3] [4]

Exploitation

To exploit this issue, an attacker must have valid administrator credentials for the GlassFish Administration Console. The attacker can then inject malicious script code into form fields that are later displayed to other administrators. The attack is performed via HTTP POST requests, and the injected payload is stored on the server. [1] No additional authentication is needed beyond the initial admin login.

Impact

If a victim administrator views the affected page, the injected script executes in their browser session. This can lead to session hijacking, exposure of sensitive data, or execution of administrative actions on behalf of the victim. [2] The stored XSS persists until manually removed, affecting all subsequent administrators who visit the compromised configuration page.

Mitigation

The vulnerability has been confirmed by the Eclipse Foundation. [2] [4] Users should upgrade to a patched version of Eclipse GlassFish as soon as one becomes available. As a temporary workaround, administrators should ensure that only trusted users have access to the Administration Console and review any unexpected content in configuration properties.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.glassfish.main.admingui:console-cluster-pluginMaven
<= 7.0.25

Affected products

2
  • Range: =7.0.15
  • Eclipse Foundation/Eclipse Glassfishv5
    Range: 7.0.15

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.