Platform
other
Component
wocu-monitoring
Opgelost in
48.2
CVE-2021-4035 describes a stored cross-site scripting (XSS) vulnerability discovered in Wocu Monitoring. This flaw resides within the report comment functionality, stemming from the use of an obsolete version of the TinyMCE editor. Successful exploitation allows an attacker to inject malicious scripts, potentially compromising user sessions and data integrity. This vulnerability affects versions 0.27 through 48.2, and a fix is available in version 48.2.
The primary impact of CVE-2021-4035 is the potential for an attacker to execute arbitrary JavaScript code within the context of a user's browser session. This can lead to various malicious actions, including session hijacking, credential theft, and defacement of the Wocu Monitoring interface. Because the vulnerability is stored, an attacker only needs to inject the malicious script once; subsequent users viewing the affected report comment will also be vulnerable. The blast radius is limited to users with privileges to view and edit reports, but the consequences of a successful attack can be significant, particularly if those users have elevated access rights within the organization.
CVE-2021-4035 was publicly disclosed on February 11, 2022. There is no indication of active exploitation campaigns targeting this vulnerability at this time. No public proof-of-concept (PoC) code has been widely released. The vulnerability is not currently listed on the CISA KEV catalog.
Organizations utilizing Wocu Monitoring for system monitoring and reporting, particularly those with users who have permissions to create and edit reports, are at risk. Environments running older, unpatched versions (0.27 - 48.1) are especially vulnerable.
disclosure
Exploit Status
EPSS
0.24% (46% percentiel)
CVSS-vector
The recommended mitigation for CVE-2021-4035 is to immediately upgrade Wocu Monitoring to version 48.2 or later, which includes a patched version of the TinyMCE editor. If upgrading is not immediately feasible, consider implementing input validation and sanitization on all user-supplied data, particularly within the report comment field. Web application firewalls (WAFs) configured to detect and block XSS payloads can provide an additional layer of protection. Regularly review and update the TinyMCE editor to ensure it is running the latest version with security patches.
Actualice Wocu Monitoring a la versión 48.2 o superior. Esta versión corrige la vulnerabilidad XSS almacenada en los comentarios de la creación de informes al actualizar el editor TinyMCE a una versión segura.
Kwetsbaarheidsanalyses en kritieke waarschuwingen direct in uw inbox.
CVE-2021-4035 is a stored cross-site scripting (XSS) vulnerability in Wocu Monitoring versions 0.27 through 48.2, affecting report comments due to an outdated TinyMCE editor.
If you are using Wocu Monitoring versions 0.27 through 48.2, you are potentially affected by this vulnerability. Check your version and upgrade if necessary.
Upgrade Wocu Monitoring to version 48.2 or later to resolve the vulnerability. Consider input validation as a temporary workaround.
There is currently no evidence of active exploitation campaigns targeting CVE-2021-4035.
Refer to the Wocu Monitoring documentation and security advisories for the official announcement and details regarding this vulnerability.
Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.