Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28670: n/a

0
Medium
VulnerabilityCVE-2024-28670cvecve-2024-28670
Published: Wed Mar 13 2024 (03/13/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

DedeCMS v5.7 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /dede/freelist_main.php.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 11:25:59 UTC

Technical Analysis

CVE-2024-28670 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability identified in DedeCMS version 5.7, a content management system widely used for website management. The vulnerability exists in the /dede/freelist_main.php endpoint, which does not properly validate the origin of requests, allowing attackers to craft malicious web pages that can trick authenticated users into unknowingly executing unwanted actions on the vulnerable CMS. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates that the attack can be performed remotely over the network without prior privileges but requires user interaction, such as clicking a malicious link or visiting a crafted webpage. The vulnerability impacts confidentiality and integrity by potentially allowing unauthorized changes or data exposure within the CMS context, but it does not affect availability. The scope is changed (S:C), meaning the attack can affect resources beyond the vulnerable component. No patches have been released yet, and no known exploits are currently observed in the wild. The underlying weakness corresponds to CWE-352, which is a common web security flaw related to missing or inadequate CSRF protections. Given the widespread use of DedeCMS in Chinese-speaking regions, this vulnerability poses a moderate risk to organizations relying on this CMS for their web presence.

Potential Impact

The primary impact of CVE-2024-28670 is the potential for unauthorized actions performed on behalf of authenticated users, leading to partial confidentiality and integrity breaches. Attackers can exploit this vulnerability to manipulate content, change settings, or perform other actions allowed by the victim's privileges within DedeCMS. While availability is not affected, the unauthorized changes can disrupt business operations, damage reputation, or lead to data leakage. Organizations worldwide using DedeCMS 5.7 are at risk, especially those without additional CSRF protections. The lack of known exploits reduces immediate risk, but the vulnerability's ease of exploitation (no authentication needed, only user interaction) means attackers could weaponize it if a proof-of-concept emerges. The impact is more significant for high-value targets such as government, media, and e-commerce websites relying on DedeCMS in regions where it is popular.

Mitigation Recommendations

Since no official patch is currently available, organizations should implement immediate mitigations to reduce risk. These include: 1) Deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious CSRF attempts targeting /dede/freelist_main.php. 2) Implementing CSRF tokens or verifying the Origin and Referer headers on the server side to ensure requests are legitimate. 3) Restricting access to the vulnerable endpoint by IP whitelisting or authentication enforcement where possible. 4) Educating users to avoid clicking on suspicious links or visiting untrusted websites while authenticated to the CMS. 5) Monitoring web server logs for unusual POST requests to the affected endpoint. 6) Planning for an update to a patched version once available from the vendor. 7) Considering temporary disabling or restricting the functionality of /dede/freelist_main.php if feasible. These targeted mitigations go beyond generic advice and focus on reducing the attack surface and preventing exploitation in the absence of a patch.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d95b7ef31ef0b588ea1

Added to database: 2/25/2026, 9:45:57 PM

Last enriched: 2/26/2026, 11:25:59 AM

Last updated: 4/12/2026, 3:33:50 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses