
Cloud Vulnerability DB
A community-led vulnerabilities database
A reflected Cross-Site Scripting (XSS) vulnerability (CVE-2024-5062) was identified in zenml-io/zenml version 0.57.1. The vulnerability exists in the survey redirect parameter, affecting the web page generation process. The issue was discovered and disclosed in June 2024, impacting all versions of zenml up to (excluding) version 0.58.0 (NVD).
The vulnerability stems from improper neutralization of input during web page generation, specifically within the survey redirect parameter. The flaw allows an attacker to redirect users to a specified URL after completing a survey, without proper validation of the 'redirect' parameter. The vulnerability has been assigned a CVSS v3.1 base score of 6.1 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N (NVD).
When exploited, this vulnerability enables attackers to execute arbitrary JavaScript code in the context of the user's browser session. This can lead to the theft of cookies, potentially resulting in account takeover (NVD).
The vulnerability has been patched in version 0.58.0 of zenml. Users are advised to upgrade to this version or later to mitigate the risk (GitHub Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."