CVE-2024-27593
Description
A stored cross-site scripting (XSS) vulnerability in the Filter function of Eramba Version 3.22.3 Community Edition allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the filter name field. This vulnerability has been fixed in version 3.23.0.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Eramba 3.22.3 Community Edition has a stored XSS in the filter name field; authenticated attackers can inject arbitrary web scripts.
Vulnerability
Overview
CVE-2024-27593 is a stored cross-site scripting (XSS) vulnerability in Eramba version 3.22.3 Community Edition. The flaw resides in the custom filter function, where the filter name field does not properly sanitize user input. An authenticated attacker can inject malicious JavaScript code into the filter name, such as 1337"'>, which is then stored and executed when another user edits the filter via the "Manage Filter" button. [1]
Exploitation
To exploit this vulnerability, an attacker must be an authenticated user of the Eramba application. The attack is carried out by creating a new filter (either private or public) and inserting a crafted XSS payload into the name field. If the filter is made public, it becomes visible to all users. The attacker sends a POST request to the filter creation endpoint, which triggers the stored payload. When the victim (another user) edits the filter by clicking the "Manage Filter" button, the malicious JavaScript code executes in their browser. No special network position is required beyond normal access to the application. [1]
Impact
Successful exploitation allows the attacker to execute arbitrary web scripts or HTML in the context of the victim's session. This can lead to session hijacking, data exfiltration, or further malicious actions within the Eramba application's interface. The CVSS v4.0 base score is 5.1 (Medium), with low impact to confidentiality and integrity, but with no impact to availability. [1]
Mitigation
The vendor has addressed this vulnerability in Eramba version 3.23.0. Users of version 3.22.3 Community Edition are advised to upgrade to the latest patched release to eliminate the XSS risk. No workarounds have been provided. [1]
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.