Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-26349: n/a

0
Medium
VulnerabilityCVE-2024-26349cvecve-2024-26349
Published: Thu Feb 22 2024 (02/22/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /core/tools/delete_translation.php

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:52:35 UTC

Technical Analysis

CVE-2024-26349 identifies a Cross-Site Request Forgery (CSRF) vulnerability in flusity-CMS version 2.33, specifically within the /core/tools/delete_translation.php component. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted requests to a web application, potentially causing state-changing actions without the user's consent. In this case, the vulnerability could enable an attacker to delete translation data by sending crafted requests to the vulnerable endpoint. The CVSS 3.1 vector indicates the attack requires network access (AV:N), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The impact is limited to availability (A:L), with no confidentiality or integrity loss. The vulnerability is classified under CWE-352, which covers CSRF issues. No patches or known exploits are currently available, suggesting the vulnerability is newly disclosed. The absence of user interaction means exploitation can be automated once the attacker has low-level access, increasing risk in multi-user environments. The vulnerability affects the availability of translation management features, which could disrupt multilingual content management in affected organizations.

Potential Impact

The primary impact of CVE-2024-26349 is on the availability of translation data within flusity-CMS installations. Successful exploitation could lead to deletion of translation entries, causing disruption in multilingual website content and potentially impairing user experience or business operations relying on accurate translations. While the vulnerability does not compromise confidentiality or integrity, the denial of service effect on translation management could affect organizations that depend heavily on localized content. This could be particularly impactful for global businesses, government agencies, and content providers using flusity-CMS for multilingual support. The requirement for low privileges limits the scope to authenticated users with some access, but the lack of user interaction needed means automated attacks are feasible. No known exploits in the wild reduce immediate risk, but unpatched systems remain vulnerable. Organizations with public-facing CMS instances are at higher risk of targeted exploitation.

Mitigation Recommendations

To mitigate CVE-2024-26349, organizations should implement strict anti-CSRF protections such as synchronizer tokens or double-submit cookies on all state-changing endpoints, including /core/tools/delete_translation.php. Restrict access to this component to only trusted and necessary users by enforcing least privilege principles and role-based access controls. Monitor web server logs for unusual or repeated requests to the vulnerable endpoint that could indicate exploitation attempts. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attack patterns targeting the CMS. Until an official patch is released, consider temporarily disabling or restricting the translation deletion functionality if feasible. Educate users about the risks of CSRF and encourage safe browsing practices, especially for authenticated users. Regularly update flusity-CMS and subscribe to vendor advisories for timely patch deployment once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d75b7ef31ef0b57257b

Added to database: 2/25/2026, 9:45:25 PM

Last enriched: 2/26/2026, 10:52:35 AM

Last updated: 4/12/2026, 5:26:31 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses