Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28672: n/a

0
Medium
VulnerabilityCVE-2024-28672cvecve-2024-28672
Published: Wed Mar 13 2024 (03/13/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

DedeCMS v5.7 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /dede/media_edit.php.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 11:26:17 UTC

Technical Analysis

DedeCMS version 5.7 contains a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2024-28672, specifically via the /dede/media_edit.php script. CSRF vulnerabilities occur when a web application does not properly verify that requests made to it originate from authenticated and authorized users, allowing attackers to trick logged-in users into submitting unwanted requests. In this case, the vulnerability enables an attacker to induce an authenticated user with at least some privileges to perform unauthorized actions related to media editing. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) indicates network attack vector, low attack complexity, requiring privileges and user interaction, with a scope change and limited confidentiality and integrity impact but no availability impact. The vulnerability is classified under CWE-352, which covers CSRF issues. No patches or exploit code are currently publicly available, and no active exploitation has been reported. DedeCMS is a content management system widely used in China and other parts of Asia, primarily for website management. The lack of CSRF tokens or inadequate validation in the media_edit.php endpoint allows attackers to craft malicious web pages or emails that, when visited or clicked by authenticated users, can cause unintended media modifications. This vulnerability could be leveraged as part of a larger attack chain to compromise website integrity or deface content. Since the vulnerability requires authenticated user interaction, it is less likely to be exploited blindly but remains a significant risk for sites with multiple users or administrators.

Potential Impact

The primary impact of this CSRF vulnerability is unauthorized modification of media content within affected DedeCMS installations. Attackers can leverage this to alter website content, potentially defacing sites, injecting malicious media files, or disrupting normal operations. Although the vulnerability does not directly affect availability, it compromises the integrity and confidentiality of the affected systems. Organizations relying on DedeCMS 5.7 for their web presence risk reputational damage, loss of user trust, and potential downstream attacks if malicious media is injected. The requirement for authenticated user interaction limits the attack surface but does not eliminate risk, especially in environments with multiple users or less security-aware administrators. The vulnerability could be chained with other exploits to escalate privileges or gain further control over the web server. Given DedeCMS's popularity in China and some Asian markets, organizations in these regions are particularly at risk. Without timely mitigation, attackers could exploit this vulnerability to conduct targeted attacks against websites, including government, educational, and commercial sectors that use DedeCMS.

Mitigation Recommendations

To mitigate CVE-2024-28672, organizations should first verify if they are running DedeCMS version 5.7 and specifically assess exposure of the /dede/media_edit.php endpoint. Immediate mitigation steps include implementing CSRF tokens on all state-changing forms and requests, ensuring that the server validates these tokens before processing requests. If patch updates become available from the DedeCMS maintainers, they should be applied promptly. In the absence of official patches, web application firewalls (WAFs) can be configured to detect and block suspicious CSRF patterns targeting the media_edit.php endpoint. Administrators should enforce the principle of least privilege, limiting user permissions to only those necessary for their roles to reduce the impact of potential exploitation. Additionally, user education on avoiding clicking suspicious links while authenticated can reduce risk. Monitoring web server logs for unusual POST requests to the media_edit.php script can help detect attempted exploitation. Finally, consider isolating or restricting access to administrative interfaces via IP whitelisting or VPN to reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d95b7ef31ef0b588ea4

Added to database: 2/25/2026, 9:45:57 PM

Last enriched: 2/26/2026, 11:26:17 AM

Last updated: 4/12/2026, 3:44:26 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses