CVE-2024-9075
low-risk
Published 2024-09-21
A vulnerability was found in Stirling-Tools Stirling-PDF up to 0.28.3. It has been declared as problematic. This vulnerability affects unknown code of the component Markdown-to-PDF. The manipulation leads to cross site scripting. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 0.29.0 is able to address this issue. It is recommended to upgrade the affected component. The vendor explains that "this functionality was removed in 0.29.0 already" and "we plan to re-add at later date with issue resolved".
Do I need to act?
-
0.13% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
2
CVSS 2.6/10
Low
NETWORK
/ HIGH complexity
Affected Products (1)
Stirling Pdf
Affected Vendors
References (4)
Permissions Required
https://vuldb.com/?ctiid.278242
Third Party Advisory
https://vuldb.com/?id.278242
Third Party Advisory
https://vuldb.com/?submit.406335
16
/ 100
low-risk
Severity
10/34 · Low
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal