CVE-2024-26349: n/a
flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /core/tools/delete_translation.php
AI Analysis
Technical Summary
CVE-2024-26349 identifies a Cross-Site Request Forgery (CSRF) vulnerability in flusity-CMS version 2.33, specifically within the /core/tools/delete_translation.php component. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted requests to a web application, potentially causing state-changing actions without the user's consent. In this case, the vulnerability could enable an attacker to delete translation data by sending crafted requests to the vulnerable endpoint. The CVSS 3.1 vector indicates the attack requires network access (AV:N), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The impact is limited to availability (A:L), with no confidentiality or integrity loss. The vulnerability is classified under CWE-352, which covers CSRF issues. No patches or known exploits are currently available, suggesting the vulnerability is newly disclosed. The absence of user interaction means exploitation can be automated once the attacker has low-level access, increasing risk in multi-user environments. The vulnerability affects the availability of translation management features, which could disrupt multilingual content management in affected organizations.
Potential Impact
The primary impact of CVE-2024-26349 is on the availability of translation data within flusity-CMS installations. Successful exploitation could lead to deletion of translation entries, causing disruption in multilingual website content and potentially impairing user experience or business operations relying on accurate translations. While the vulnerability does not compromise confidentiality or integrity, the denial of service effect on translation management could affect organizations that depend heavily on localized content. This could be particularly impactful for global businesses, government agencies, and content providers using flusity-CMS for multilingual support. The requirement for low privileges limits the scope to authenticated users with some access, but the lack of user interaction needed means automated attacks are feasible. No known exploits in the wild reduce immediate risk, but unpatched systems remain vulnerable. Organizations with public-facing CMS instances are at higher risk of targeted exploitation.
Mitigation Recommendations
To mitigate CVE-2024-26349, organizations should implement strict anti-CSRF protections such as synchronizer tokens or double-submit cookies on all state-changing endpoints, including /core/tools/delete_translation.php. Restrict access to this component to only trusted and necessary users by enforcing least privilege principles and role-based access controls. Monitor web server logs for unusual or repeated requests to the vulnerable endpoint that could indicate exploitation attempts. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attack patterns targeting the CMS. Until an official patch is released, consider temporarily disabling or restricting the translation deletion functionality if feasible. Educate users about the risks of CSRF and encourage safe browsing practices, especially for authenticated users. Regularly update flusity-CMS and subscribe to vendor advisories for timely patch deployment once available.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Netherlands, India, Brazil, Japan
CVE-2024-26349: n/a
Description
flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /core/tools/delete_translation.php
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-26349 identifies a Cross-Site Request Forgery (CSRF) vulnerability in flusity-CMS version 2.33, specifically within the /core/tools/delete_translation.php component. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted requests to a web application, potentially causing state-changing actions without the user's consent. In this case, the vulnerability could enable an attacker to delete translation data by sending crafted requests to the vulnerable endpoint. The CVSS 3.1 vector indicates the attack requires network access (AV:N), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The impact is limited to availability (A:L), with no confidentiality or integrity loss. The vulnerability is classified under CWE-352, which covers CSRF issues. No patches or known exploits are currently available, suggesting the vulnerability is newly disclosed. The absence of user interaction means exploitation can be automated once the attacker has low-level access, increasing risk in multi-user environments. The vulnerability affects the availability of translation management features, which could disrupt multilingual content management in affected organizations.
Potential Impact
The primary impact of CVE-2024-26349 is on the availability of translation data within flusity-CMS installations. Successful exploitation could lead to deletion of translation entries, causing disruption in multilingual website content and potentially impairing user experience or business operations relying on accurate translations. While the vulnerability does not compromise confidentiality or integrity, the denial of service effect on translation management could affect organizations that depend heavily on localized content. This could be particularly impactful for global businesses, government agencies, and content providers using flusity-CMS for multilingual support. The requirement for low privileges limits the scope to authenticated users with some access, but the lack of user interaction needed means automated attacks are feasible. No known exploits in the wild reduce immediate risk, but unpatched systems remain vulnerable. Organizations with public-facing CMS instances are at higher risk of targeted exploitation.
Mitigation Recommendations
To mitigate CVE-2024-26349, organizations should implement strict anti-CSRF protections such as synchronizer tokens or double-submit cookies on all state-changing endpoints, including /core/tools/delete_translation.php. Restrict access to this component to only trusted and necessary users by enforcing least privilege principles and role-based access controls. Monitor web server logs for unusual or repeated requests to the vulnerable endpoint that could indicate exploitation attempts. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attack patterns targeting the CMS. Until an official patch is released, consider temporarily disabling or restricting the translation deletion functionality if feasible. Educate users about the risks of CSRF and encourage safe browsing practices, especially for authenticated users. Regularly update flusity-CMS and subscribe to vendor advisories for timely patch deployment once available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-02-19T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d75b7ef31ef0b57257b
Added to database: 2/25/2026, 9:45:25 PM
Last enriched: 2/26/2026, 10:52:35 AM
Last updated: 4/12/2026, 5:26:31 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.