CVE-2024-24771: CWE-284: Improper Access Control in open-formulieren open-forms
Open Forms allows users create and publish smart forms. Versions prior to 2.2.9, 2.3.7, 2.4.5, and 2.5.2 contain a non-exploitable multi-factor authentication weakness. Superusers who have their credentials (username + password) compromised could potentially have the second-factor authentication bypassed if an attacker somehow managed to authenticate to Open Forms. The maintainers of Open Forms do not believe it is or has been possible to perform this login. However, if this were possible, the victim's account may be abused to view (potentially sensitive) submission data or have been used to impersonate other staff accounts to view and/or modify data. Three mitigating factors to help prevent exploitation include: the usual login page (at `/admin/login/`) does not fully log in the user until the second factor was succesfully provided; the additional non-MFA protected login page at `/api/v2/api-authlogin/` was misconfigured and could not be used to log in; and there are no additional ways to log in. This also requires credentials of a superuser to be compromised to be exploitable. Versions 2.2.9, 2.3.7, 2.4.5, and 2.5.2 contain the following patches to address these weaknesses: Move and only enable the API auth endpoints (`/api/v2/api-auth/login/`) with `settings.DEBUG = True`. `settings.DEBUG = True` is insecure and should never be applied in production settings. Additionally, apply a custom permission check to the hijack flow to only allow second-factor-verified superusers to perform user hijacking.
AI Analysis
Technical Summary
CVE-2024-24771 is a vulnerability classified under CWE-284 (Improper Access Control), CWE-287 (Improper Authentication), and CWE-654 (Exposure of Resource to Wrong Sphere) affecting the open-source Open Forms platform, which enables users to create and publish smart forms. The flaw exists in versions prior to 2.2.9, 2.3.7, 2.4.5, and 2.5.2, where a multi-factor authentication (MFA) mechanism intended to protect superuser accounts can potentially be bypassed if an attacker has already compromised the username and password credentials. The maintainers note that the bypass is non-exploitable under normal conditions due to three key mitigating factors: (1) the main login page requires successful MFA completion before granting full access, (2) the secondary API authentication endpoint (`/api/v2/api-auth/login/`) was misconfigured and does not allow login, and (3) no other login methods exist. However, if an attacker could authenticate via the vulnerable path, they could bypass the second factor, leading to unauthorized access to sensitive submission data and the ability to impersonate other staff accounts, potentially modifying or viewing confidential information. The patches introduced in the fixed versions restrict the API authentication endpoints to only be enabled when `settings.DEBUG = True` (which should never be enabled in production) and add custom permission checks to ensure only second-factor-verified superusers can perform user hijacking. The vulnerability has a CVSS 3.1 score of 7.7, indicating high severity due to network attack vector, high privileges required, no user interaction, and a scope change with high confidentiality and integrity impacts but no availability impact. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations using Open Forms, especially those handling sensitive or personal data through smart forms (e.g., government agencies, healthcare providers, financial institutions), this vulnerability poses a significant risk. If superuser credentials are compromised, attackers could bypass MFA protections, gaining unauthorized access to sensitive submission data, potentially including personal identifiable information (PII) or confidential business data. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and unauthorized data manipulation. The ability to impersonate staff accounts further exacerbates the risk by enabling lateral movement and privilege escalation within the organization’s systems. Although exploitation requires credential compromise and is mitigated by certain factors, the high-impact nature of the vulnerability means organizations must act promptly to patch affected versions. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially given the public disclosure and availability of technical details.
Mitigation Recommendations
European organizations should immediately verify their Open Forms version and upgrade to versions 2.2.9, 2.3.7, 2.4.5, or 2.5.2 or later, where the vulnerability is patched. Ensure that `settings.DEBUG` is never enabled in production environments to prevent exposure of the API authentication endpoints. Implement strict access controls and monitoring on superuser accounts, including enforcing strong password policies and continuous credential hygiene to prevent compromise. Employ additional layers of security such as network segmentation and anomaly detection to identify unusual access patterns indicative of account hijacking. Regularly audit user permissions and review logs for unauthorized access attempts. Consider integrating external MFA solutions that are independent of the vulnerable Open Forms MFA implementation to add defense in depth. Finally, educate administrators about the risks of credential compromise and the importance of applying security patches promptly.
Affected Countries
Germany, France, Netherlands, Belgium, United Kingdom, Sweden, Denmark, Finland
CVE-2024-24771: CWE-284: Improper Access Control in open-formulieren open-forms
Description
Open Forms allows users create and publish smart forms. Versions prior to 2.2.9, 2.3.7, 2.4.5, and 2.5.2 contain a non-exploitable multi-factor authentication weakness. Superusers who have their credentials (username + password) compromised could potentially have the second-factor authentication bypassed if an attacker somehow managed to authenticate to Open Forms. The maintainers of Open Forms do not believe it is or has been possible to perform this login. However, if this were possible, the victim's account may be abused to view (potentially sensitive) submission data or have been used to impersonate other staff accounts to view and/or modify data. Three mitigating factors to help prevent exploitation include: the usual login page (at `/admin/login/`) does not fully log in the user until the second factor was succesfully provided; the additional non-MFA protected login page at `/api/v2/api-authlogin/` was misconfigured and could not be used to log in; and there are no additional ways to log in. This also requires credentials of a superuser to be compromised to be exploitable. Versions 2.2.9, 2.3.7, 2.4.5, and 2.5.2 contain the following patches to address these weaknesses: Move and only enable the API auth endpoints (`/api/v2/api-auth/login/`) with `settings.DEBUG = True`. `settings.DEBUG = True` is insecure and should never be applied in production settings. Additionally, apply a custom permission check to the hijack flow to only allow second-factor-verified superusers to perform user hijacking.
AI-Powered Analysis
Technical Analysis
CVE-2024-24771 is a vulnerability classified under CWE-284 (Improper Access Control), CWE-287 (Improper Authentication), and CWE-654 (Exposure of Resource to Wrong Sphere) affecting the open-source Open Forms platform, which enables users to create and publish smart forms. The flaw exists in versions prior to 2.2.9, 2.3.7, 2.4.5, and 2.5.2, where a multi-factor authentication (MFA) mechanism intended to protect superuser accounts can potentially be bypassed if an attacker has already compromised the username and password credentials. The maintainers note that the bypass is non-exploitable under normal conditions due to three key mitigating factors: (1) the main login page requires successful MFA completion before granting full access, (2) the secondary API authentication endpoint (`/api/v2/api-auth/login/`) was misconfigured and does not allow login, and (3) no other login methods exist. However, if an attacker could authenticate via the vulnerable path, they could bypass the second factor, leading to unauthorized access to sensitive submission data and the ability to impersonate other staff accounts, potentially modifying or viewing confidential information. The patches introduced in the fixed versions restrict the API authentication endpoints to only be enabled when `settings.DEBUG = True` (which should never be enabled in production) and add custom permission checks to ensure only second-factor-verified superusers can perform user hijacking. The vulnerability has a CVSS 3.1 score of 7.7, indicating high severity due to network attack vector, high privileges required, no user interaction, and a scope change with high confidentiality and integrity impacts but no availability impact. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations using Open Forms, especially those handling sensitive or personal data through smart forms (e.g., government agencies, healthcare providers, financial institutions), this vulnerability poses a significant risk. If superuser credentials are compromised, attackers could bypass MFA protections, gaining unauthorized access to sensitive submission data, potentially including personal identifiable information (PII) or confidential business data. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and unauthorized data manipulation. The ability to impersonate staff accounts further exacerbates the risk by enabling lateral movement and privilege escalation within the organization’s systems. Although exploitation requires credential compromise and is mitigated by certain factors, the high-impact nature of the vulnerability means organizations must act promptly to patch affected versions. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially given the public disclosure and availability of technical details.
Mitigation Recommendations
European organizations should immediately verify their Open Forms version and upgrade to versions 2.2.9, 2.3.7, 2.4.5, or 2.5.2 or later, where the vulnerability is patched. Ensure that `settings.DEBUG` is never enabled in production environments to prevent exposure of the API authentication endpoints. Implement strict access controls and monitoring on superuser accounts, including enforcing strong password policies and continuous credential hygiene to prevent compromise. Employ additional layers of security such as network segmentation and anomaly detection to identify unusual access patterns indicative of account hijacking. Regularly audit user permissions and review logs for unauthorized access attempts. Consider integrating external MFA solutions that are independent of the vulnerable Open Forms MFA implementation to add defense in depth. Finally, educate administrators about the risks of credential compromise and the importance of applying security patches promptly.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2024-01-29T20:51:26.013Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697d10c0ac0632022277c280
Added to database: 1/30/2026, 8:12:48 PM
Last enriched: 1/30/2026, 8:27:27 PM
Last updated: 2/7/2026, 10:37:18 PM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2114: SQL Injection in itsourcecode Society Management System
MediumCVE-2026-25858: CWE-640 Weak Password Recovery Mechanism for Forgotten Password in macrozheng mall
CriticalCVE-2026-25857: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Shenzhen Tenda Technology Tenda G300-F
HighCVE-2025-15564: Divide By Zero in Mapnik
MediumCVE-2026-2113: Deserialization in yuan1994 tpadmin
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.