CVE-2024-44088

📊 6.1 MEDIUM0.1%🎯 0 exploits
📅 Published Oct 14, 2025
📋 Status: Analyzed

Malicious script injection ('Cross-site Scripting') vulnerability in Apache Geode web-api (REST). This vulnerability allows an attacker that tricks a logged-in user into clicking a specially-crafted link to execute code on the returned page, which could lead to theft of the user's session information and even account takeover. This issue affects Apache Geode: all versions prior to 1.15.2 Users are recommended to upgrade to version 1.15.2, which fixes the issue.

🎯 Affected Products & Systems

1 product configurations affected

Filter by type:
📱
Application
Vulnerable
Version: ≥ 1.1.0 ∧ < 1.15.2
CPE:
cpe:2.3:a:apache:geode:*:*:*:*:*:*:*:*
Metrics
6.1 MEDIUMCVSS v3.1134c704f-9b21-4f2e-91b3-4a467353bcc0
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack Vector:
NETWORK
Complexity:
LOW
Privileges:
NONE
User Interaction:
REQUIRED
Confidentiality:
LOW
Integrity:
LOW
Availability:
NONE
Scope:
CHANGED

🔍 Technical Details

Analysis Status
Analyzed
CVSS Details
6.1 (MEDIUM)v3.1
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
EPSS Details
0.1% (Minimal)29.0th percentile
Last updated: Oct 31, 2025
Exploitation probability within 30 days
Published Date
Oct 14, 2025 (19 days ago)
Last Modified
Oct 20, 2025 (12 days ago)
Security Weaknesses1
References2