CVE-2024-52290

LF Edge eKuiper is a lightweight internet of things (IoT) data analytics and stream processing engine. Prior to version 2.1.0 user with rights to modificate the service (e.g. kuiperUser role) can inject a cross-site scripting payload into Connection Configuration key `Name` (`confKey`) parameter. After this setup, when any user with access to this service (e.g. admin) tries to delete this key, a payload acts in the victim's browser. Version 2.1.0 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:lfedge:ekuiper:*:*:*:*:*:*:*:*

History

11 Jul 2025, 16:20

Type Values Removed Values Added
First Time Lfedge ekuiper
Lfedge
CPE cpe:2.3:a:lfedge:ekuiper:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
References () https://github.com/lf-edge/ekuiper/security/advisories/GHSA-9cwv-pxcr-hfjc - () https://github.com/lf-edge/ekuiper/security/advisories/GHSA-9cwv-pxcr-hfjc - Exploit, Vendor Advisory

14 May 2025, 14:15

Type Values Removed Values Added
CWE CWE-79

14 May 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-14 08:15

Updated : 2025-07-11 16:20


NVD link : CVE-2024-52290

Mitre link : CVE-2024-52290


JSON object : View

Products Affected

lfedge

  • ekuiper
CWE

No CWE.