CVE-2024-45964
Description
Zenario 9.7.61188 is vulnerable to Cross Site Scripting (XSS) in the Image library via the "Organizer tags" field.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Zenario 9.7.61188 is vulnerable to stored cross-site scripting (XSS) in the Image library via the 'Organizer tags' field, allowing authenticated admin users to inject malicious scripts.
Vulnerability
Overview
Zenario 9.7.61188, an open-source content management system [2], contains a stored cross-site scripting (XSS) vulnerability in its Image library feature. The flaw resides in the 'Organizer tags' field, where user-supplied input is not properly sanitized before being stored and later rendered in the administrative interface. This allows an attacker to inject arbitrary JavaScript code that will execute in the context of other users' browsers when they view the affected image metadata [1].
Exploitation
Prerequisites
To exploit this vulnerability, an attacker must have authenticated access to the Zenario backend with permissions to manage the Image library. The administrative interface for organizing images exposes the vulnerable 'Organizer tags' input field. Since the injected script is stored on the server, it will be triggered whenever an authorized user accesses the image's properties or listing where the malicious tags are displayed. No special network position is required beyond standard web access to the admin panel [1].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the browser of any administrator who views the compromised image records. This can lead to session hijacking, theft of sensitive data displayed in the admin interface, or further malicious actions performed under the victim's authenticated session. The stored nature of the XSS increases its persistence and potential reach across the admin user base [1].
Mitigation
At the time of the CVE publication, no official patch had been released by the vendor. Administrators should review the official Zenario repository [2] for any future updates. As a general security practice, input validation and output encoding should be strictly enforced for all user-controlled fields. Organizations using Zenario should monitor vendor advisories and consider applying principle of least privilege to reduce the number of users with Image library access until a fix is available [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
tribalsystems/zenarioPackagist | <= 9.7.61188 | — |
Affected products
2- Zenario/Zenariodescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.