CVE-2024-45878
Description
The "Stammdaten" menu of baltic-it TOPqw Webportal v1.35.283.2 (fixed in version 1.35.291), in /Apps/TOPqw/qwStammdaten.aspx, is vulnerable to persistent Cross-Site Scripting (XSS).
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A stored XSS vulnerability in the 'Stammdaten' menu of baltic-it TOPqw Webportal allows authenticated attackers to inject arbitrary web scripts.
Vulnerability
Overview
The 'Stammdaten' menu of baltic-it TOPqw Webportal v1.35.283.2 is vulnerable to persistent (stored) Cross-Site Scripting (XSS). The vulnerability resides in the page /Apps/TOPqw/qwStammdaten.aspx and allows an authenticated attacker to inject arbitrary JavaScript or HTML code that gets stored on the server and executed when other users view the affected page. The input validation and sanitization are insufficient, leading to the stored XSS flaw [1].
Exploitation
Prerequisites
An attacker must be authenticated to the web portal, as the 'Stammdaten' menu is part of the login-protected area. After authenticating, the attacker can inject malicious script payloads into input fields that are not properly sanitized. The script is then stored and served to other authenticated users who visit the same menu, triggering the XSS payload in their browsers [1].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's session. This can lead to session hijacking, exfiltration of sensitive data, defacement, or further attacks against other users. Since the portal stores sensitive personal information about citizens and confidential documents, this XSS vulnerability could be leveraged to access or manipulate such data within the authenticated session [1].
Mitigation
The vendor has addressed the vulnerability in version 1.35.291 of the web portal. Users are advised to update their installations to this fixed version or later. The vulnerability was discovered during a penetration test by G DATA ADAN and disclosed responsibly to the vendor, who promptly released a patch [1].
For the 'QWKalkulation' component, a similar stored XSS vulnerability (CVE-2024-45879) was also fixed in the same version.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: =1.35.283.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.