CVE-2026-3024 Overview
A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Wakyma web application, specifically affecting the endpoint vets.wakyma.com/configuracion/agenda/modelo-formulario-evento. This vulnerability allows authenticated users with permission to create personalized accounts to inject malicious scripts through the creation of a crafted survey. The stored XSS payload persists in the application and executes whenever other users access the affected content, potentially impacting the entire veterinary team using the platform.
The vulnerability is particularly concerning because it enables privilege escalation scenarios where users with low privileges can exploit the XSS to access unauthorized data and perform actions with elevated permissions beyond their intended access level.
Critical Impact
Authenticated attackers can inject persistent malicious scripts that execute in the context of other users' sessions, enabling unauthorized data access and privilege escalation across the veterinary team.
Affected Products
- Wakyma Web Application (all versions)
- vets.wakyma.com platform
- Survey/form creation functionality at /configuracion/agenda/modelo-formulario-evento
Discovery Timeline
- 2026-03-16 - CVE-2026-3024 published to NVD
- 2026-03-19 - Last updated in NVD database
Technical Details for CVE-2026-3024
Vulnerability Analysis
This stored XSS vulnerability (CWE-79) resides in the form/survey creation functionality of the Wakyma veterinary management application. The application fails to properly sanitize user-supplied input when creating personalized survey forms, allowing malicious JavaScript code to be stored in the application database.
When other users—including those with higher privileges—view or interact with the malicious survey, the injected script executes within their browser context. This creates a significant security risk as attackers can potentially steal session tokens, perform actions on behalf of privileged users, or exfiltrate sensitive veterinary and client data.
The attack requires network access and user authentication with survey creation permissions, though the attacker needs only low-privilege access to exploit the flaw. Victim interaction is required for the payload to execute, as the targeted user must access the crafted survey content.
Root Cause
The root cause of this vulnerability is insufficient input validation and output encoding in the survey/form creation module. The application accepts and stores user-provided content without proper sanitization, then renders this content to other users without appropriate HTML entity encoding or Content Security Policy protections. This allows specially crafted HTML and JavaScript payloads to be interpreted and executed by the victim's browser rather than being displayed as harmless text.
Attack Vector
The attack vector is network-based, requiring the attacker to have authenticated access to the Wakyma application with permissions to create surveys or personalized forms. The exploitation flow involves:
- An authenticated attacker with survey creation privileges navigates to the vulnerable endpoint
- The attacker creates a new survey containing malicious JavaScript embedded in form fields or survey content
- The payload is stored in the application database without proper sanitization
- When other users (potentially with higher privileges) access or view the survey, the malicious script executes in their browser
- The attacker can then harvest session cookies, perform CSRF attacks, or execute unauthorized actions using the victim's credentials
The vulnerability does not require complex exploitation techniques and can be triggered through standard web interactions. For detailed technical information, refer to the INCIBE Security Notice.
Detection Methods for CVE-2026-3024
Indicators of Compromise
- Unusual JavaScript patterns in survey or form content fields within the database
- Survey entries containing HTML tags such as <script>, <img onerror=, <svg onload=, or event handlers
- Unexpected outbound network requests from user browsers when viewing survey content
- User reports of unusual behavior or pop-ups when accessing surveys
Detection Strategies
- Implement Web Application Firewall (WAF) rules to detect XSS payloads in form submissions
- Monitor application logs for suspicious characters and encoded strings in survey creation requests
- Deploy browser-based security monitoring to detect unauthorized script execution
- Review database content for stored XSS patterns in survey-related tables
Monitoring Recommendations
- Enable detailed logging for the /configuracion/agenda/modelo-formulario-evento endpoint
- Configure alerts for form submissions containing script tags or JavaScript event handlers
- Monitor for unusual session activity that may indicate session hijacking following XSS exploitation
- Implement Content Security Policy (CSP) reporting to detect policy violations
How to Mitigate CVE-2026-3024
Immediate Actions Required
- Audit existing survey and form content in the database for malicious scripts
- Remove or sanitize any identified malicious payloads from stored data
- Implement strict input validation on all user-supplied content in the survey creation module
- Apply output encoding (HTML entity encoding) when rendering user-generated content
- Restrict survey creation permissions to trusted users until a patch is available
Patch Information
At the time of publication, no vendor patch information has been released. Organizations should monitor the INCIBE Security Notice for updates from Wakyma regarding security fixes. Contact the Wakyma vendor directly for patch availability and recommended remediation steps.
Workarounds
- Implement a Web Application Firewall (WAF) with XSS filtering rules to block malicious payloads
- Deploy Content Security Policy (CSP) headers to restrict inline script execution
- Limit survey creation privileges to essential personnel only
- Conduct regular security audits of stored survey content for malicious code
- Consider disabling the affected survey creation functionality until a vendor patch is available
# Example CSP header configuration (Apache)
Header set Content-Security-Policy "default-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data:; frame-ancestors 'none';"
# Example CSP header configuration (Nginx)
add_header Content-Security-Policy "default-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data:; frame-ancestors 'none';" always;
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


