CVE-2024-8776

INTUMIT SmartRobot - Cross-site Scripting

Description

SmartRobot from INTUMIT does not properly validate a specific page parameter, allowing unautheticated remote attackers to inject JavaScript code to the parameter for Reflected Cross-site Scripting attacks.

Remediation

Solution:

  • Update SmartRobot to version v7.1.0 or later, or contact the vendor for patch recommendations.

Category

6.1
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.06%
Third-Party Advisory org.tw Third-Party Advisory org.tw
Affected: INTUMIT SmartRobot
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-8776?
CVE-2024-8776 has been scored as a medium severity vulnerability.
How to fix CVE-2024-8776?
To fix CVE-2024-8776: Update SmartRobot to version v7.1.0 or later, or contact the vendor for patch recommendations.
Is CVE-2024-8776 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-8776 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-8776?
CVE-2024-8776 affects INTUMIT SmartRobot.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.