CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-26135: MeshCentral cross-site websocket hijacking (CSWSH) vulnerability

8.4 CVSS

Description

MeshCentral is a full computer management web site. Versions prior to 1.1.21 a cross-site websocket hijacking (CSWSH) vulnerability within the control.ashx endpoint. This component is the primary mechanism used within MeshCentral to perform administrative actions on the server. The vulnerability is exploitable when an attacker is able to convince a victim end-user to click on a malicious link to a page hosting an attacker-controlled site. The attacker can then originate a cross-site websocket connection using client-side JavaScript code to connect to `control.ashx` as the victim user within MeshCentral. Version 1.1.21 contains a patch for this issue.

Classification

CVE ID: CVE-2024-26135

CVSS Base Severity: HIGH

CVSS Base Score: 8.4

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

Problem Types

CWE-346: Origin Validation Error

Affected Products

Vendor: Ylianst

Product: MeshCentral

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.56% (probability of being exploited)

EPSS Percentile: 67.24% (scored less or equal to compared to others)

EPSS Date: 2025-05-21 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: none

SSVC Technical Impact: total

SSVC Automatable: false

References

https://nvd.nist.gov/vuln/detail/CVE-2024-26135
https://github.com/Ylianst/MeshCentral/security/advisories/GHSA-cp68-qrhr-g9h8
https://github.com/Ylianst/MeshCentral/commit/f2e43cc6da9f5447dbff0948e6c6024c8a315af3

Timeline