Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-24771: CWE-284: Improper Access Control in open-formulieren open-forms

0
High
VulnerabilityCVE-2024-24771cvecve-2024-24771cwe-284cwe-287cwe-654
Published: Wed Feb 07 2024 (02/07/2024, 14:51:10 UTC)
Source: CVE Database V5
Vendor/Project: open-formulieren
Product: open-forms

Description

Open Forms allows users create and publish smart forms. Versions prior to 2.2.9, 2.3.7, 2.4.5, and 2.5.2 contain a non-exploitable multi-factor authentication weakness. Superusers who have their credentials (username + password) compromised could potentially have the second-factor authentication bypassed if an attacker somehow managed to authenticate to Open Forms. The maintainers of Open Forms do not believe it is or has been possible to perform this login. However, if this were possible, the victim's account may be abused to view (potentially sensitive) submission data or have been used to impersonate other staff accounts to view and/or modify data. Three mitigating factors to help prevent exploitation include: the usual login page (at `/admin/login/`) does not fully log in the user until the second factor was succesfully provided; the additional non-MFA protected login page at `/api/v2/api-authlogin/` was misconfigured and could not be used to log in; and there are no additional ways to log in. This also requires credentials of a superuser to be compromised to be exploitable. Versions 2.2.9, 2.3.7, 2.4.5, and 2.5.2 contain the following patches to address these weaknesses: Move and only enable the API auth endpoints (`/api/v2/api-auth/login/`) with `settings.DEBUG = True`. `settings.DEBUG = True` is insecure and should never be applied in production settings. Additionally, apply a custom permission check to the hijack flow to only allow second-factor-verified superusers to perform user hijacking.

AI-Powered Analysis

AILast updated: 01/30/2026, 20:27:27 UTC

Technical Analysis

CVE-2024-24771 is a vulnerability classified under CWE-284 (Improper Access Control), CWE-287 (Improper Authentication), and CWE-654 (Exposure of Resource to Wrong Sphere) affecting the open-source Open Forms platform, which enables users to create and publish smart forms. The flaw exists in versions prior to 2.2.9, 2.3.7, 2.4.5, and 2.5.2, where a multi-factor authentication (MFA) mechanism intended to protect superuser accounts can potentially be bypassed if an attacker has already compromised the username and password credentials. The maintainers note that the bypass is non-exploitable under normal conditions due to three key mitigating factors: (1) the main login page requires successful MFA completion before granting full access, (2) the secondary API authentication endpoint (`/api/v2/api-auth/login/`) was misconfigured and does not allow login, and (3) no other login methods exist. However, if an attacker could authenticate via the vulnerable path, they could bypass the second factor, leading to unauthorized access to sensitive submission data and the ability to impersonate other staff accounts, potentially modifying or viewing confidential information. The patches introduced in the fixed versions restrict the API authentication endpoints to only be enabled when `settings.DEBUG = True` (which should never be enabled in production) and add custom permission checks to ensure only second-factor-verified superusers can perform user hijacking. The vulnerability has a CVSS 3.1 score of 7.7, indicating high severity due to network attack vector, high privileges required, no user interaction, and a scope change with high confidentiality and integrity impacts but no availability impact. No known exploits have been reported in the wild to date.

Potential Impact

For European organizations using Open Forms, especially those handling sensitive or personal data through smart forms (e.g., government agencies, healthcare providers, financial institutions), this vulnerability poses a significant risk. If superuser credentials are compromised, attackers could bypass MFA protections, gaining unauthorized access to sensitive submission data, potentially including personal identifiable information (PII) or confidential business data. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and unauthorized data manipulation. The ability to impersonate staff accounts further exacerbates the risk by enabling lateral movement and privilege escalation within the organization’s systems. Although exploitation requires credential compromise and is mitigated by certain factors, the high-impact nature of the vulnerability means organizations must act promptly to patch affected versions. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially given the public disclosure and availability of technical details.

Mitigation Recommendations

European organizations should immediately verify their Open Forms version and upgrade to versions 2.2.9, 2.3.7, 2.4.5, or 2.5.2 or later, where the vulnerability is patched. Ensure that `settings.DEBUG` is never enabled in production environments to prevent exposure of the API authentication endpoints. Implement strict access controls and monitoring on superuser accounts, including enforcing strong password policies and continuous credential hygiene to prevent compromise. Employ additional layers of security such as network segmentation and anomaly detection to identify unusual access patterns indicative of account hijacking. Regularly audit user permissions and review logs for unauthorized access attempts. Consider integrating external MFA solutions that are independent of the vulnerable Open Forms MFA implementation to add defense in depth. Finally, educate administrators about the risks of credential compromise and the importance of applying security patches promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2024-01-29T20:51:26.013Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697d10c0ac0632022277c280

Added to database: 1/30/2026, 8:12:48 PM

Last enriched: 1/30/2026, 8:27:27 PM

Last updated: 2/7/2026, 10:37:18 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats