VYPR
Low severityNVD Advisory· Published Oct 2, 2024· Updated Oct 2, 2024

CVE-2024-45964

CVE-2024-45964

Description

Zenario 9.7.61188 is vulnerable to Cross Site Scripting (XSS) in the Image library via the "Organizer tags" field.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Zenario 9.7.61188 is vulnerable to stored cross-site scripting (XSS) in the Image library via the 'Organizer tags' field, allowing authenticated admin users to inject malicious scripts.

Vulnerability

Overview

Zenario 9.7.61188, an open-source content management system [2], contains a stored cross-site scripting (XSS) vulnerability in its Image library feature. The flaw resides in the 'Organizer tags' field, where user-supplied input is not properly sanitized before being stored and later rendered in the administrative interface. This allows an attacker to inject arbitrary JavaScript code that will execute in the context of other users' browsers when they view the affected image metadata [1].

Exploitation

Prerequisites

To exploit this vulnerability, an attacker must have authenticated access to the Zenario backend with permissions to manage the Image library. The administrative interface for organizing images exposes the vulnerable 'Organizer tags' input field. Since the injected script is stored on the server, it will be triggered whenever an authorized user accesses the image's properties or listing where the malicious tags are displayed. No special network position is required beyond standard web access to the admin panel [1].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the browser of any administrator who views the compromised image records. This can lead to session hijacking, theft of sensitive data displayed in the admin interface, or further malicious actions performed under the victim's authenticated session. The stored nature of the XSS increases its persistence and potential reach across the admin user base [1].

Mitigation

At the time of the CVE publication, no official patch had been released by the vendor. Administrators should review the official Zenario repository [2] for any future updates. As a general security practice, input validation and output encoding should be strictly enforced for all user-controlled fields. Organizations using Zenario should monitor vendor advisories and consider applying principle of least privilege to reduce the number of users with Image library access until a fix is available [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
tribalsystems/zenarioPackagist
<= 9.7.61188

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.