CVE-2024-55342
Description
A file upload functionality in Piranha CMS 11.1 allows authenticated remote attackers to upload a crafted PDF file to /manager/media. This PDF can contain malicious JavaScript code, which is executed when a victim user opens or interacts with the PDF in their web browser, leading to a XSS vulnerability.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Piranha CMS 11.1 allows authenticated attackers to upload a crafted PDF containing malicious JavaScript, leading to stored XSS when a victim opens the file.
Root
Cause CVE-2024-55342 is a stored cross-site scripting (XSS) vulnerability found in Piranha CMS version 11.1. The flaw resides in the file upload functionality accessible at /manager/media. An authenticated attacker can upload a specially crafted PDF file containing embedded JavaScript code. The application does not sanitize or validate the content of the uploaded PDF, allowing the malicious script to be stored on the server. [1]
Exploitation
Prerequisites To exploit this vulnerability, an attacker must first have a valid account with the ability to access the media manager. The attacker logs in via /manager/login, navigates to the Media section, and uploads a malicious PDF (e.g., one generated using a proof-of-concept tool) to the /manager/media endpoint. The attack does not require any additional privileges beyond standard media upload rights. [2]
Impact
When a victim user (such as an administrator or other content editor) opens or interacts with the uploaded PDF in their browser, the embedded JavaScript executes within the context of the Piranha CMS web application. This can lead to session hijacking, theft of sensitive data, defacement, or further actions performed on behalf of the victim. The XSS is stored, meaning the payload persists until the malicious file is removed. [1][2]
Mitigation
As of December 2024, no official patch has been released for this vulnerability. Administrators should restrict media upload permissions to only trusted users, disable PDF preview if possible, or implement a content security policy (CSP) to mitigate script execution. The vendor has not acknowledged a fix at the time of disclosure. [1][2]
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
PiranhaNuGet | <= 11.1.0 | — |
Affected products
3- Piranha CMS/Piranha CMSdescription
- Range: = 11.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.