VYPR
Moderate severityNVD Advisory· Published Dec 20, 2024· Updated Dec 20, 2024

CVE-2024-55342

CVE-2024-55342

Description

A file upload functionality in Piranha CMS 11.1 allows authenticated remote attackers to upload a crafted PDF file to /manager/media. This PDF can contain malicious JavaScript code, which is executed when a victim user opens or interacts with the PDF in their web browser, leading to a XSS vulnerability.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Piranha CMS 11.1 allows authenticated attackers to upload a crafted PDF containing malicious JavaScript, leading to stored XSS when a victim opens the file.

Root

Cause CVE-2024-55342 is a stored cross-site scripting (XSS) vulnerability found in Piranha CMS version 11.1. The flaw resides in the file upload functionality accessible at /manager/media. An authenticated attacker can upload a specially crafted PDF file containing embedded JavaScript code. The application does not sanitize or validate the content of the uploaded PDF, allowing the malicious script to be stored on the server. [1]

Exploitation

Prerequisites To exploit this vulnerability, an attacker must first have a valid account with the ability to access the media manager. The attacker logs in via /manager/login, navigates to the Media section, and uploads a malicious PDF (e.g., one generated using a proof-of-concept tool) to the /manager/media endpoint. The attack does not require any additional privileges beyond standard media upload rights. [2]

Impact

When a victim user (such as an administrator or other content editor) opens or interacts with the uploaded PDF in their browser, the embedded JavaScript executes within the context of the Piranha CMS web application. This can lead to session hijacking, theft of sensitive data, defacement, or further actions performed on behalf of the victim. The XSS is stored, meaning the payload persists until the malicious file is removed. [1][2]

Mitigation

As of December 2024, no official patch has been released for this vulnerability. Administrators should restrict media upload permissions to only trusted users, disable PDF preview if possible, or implement a content security policy (CSP) to mitigate script execution. The vendor has not acknowledged a fix at the time of disclosure. [1][2]

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
PiranhaNuGet
<= 11.1.0

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.