### [CVE-2024-2383](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2383) ![](https://img.shields.io/static/v1?label=Product&message=zenml-io%2Fzenml&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames&color=brightgreen) ### Description A clickjacking vulnerability exists in zenml-io/zenml versions up to and including 0.55.5 due to the application's failure to set appropriate X-Frame-Options or Content-Security-Policy HTTP headers. This vulnerability allows an attacker to embed the application UI within an iframe on a malicious page, potentially leading to unauthorized actions by tricking users into interacting with the interface under the attacker's control. The issue was addressed in version 0.56.3. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/sonalvijit/cve