Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28678: n/a

0
Medium
VulnerabilityCVE-2024-28678cvecve-2024-28678
Published: Wed Mar 13 2024 (03/13/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

DedeCMS v5.7 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via the component /dede/article_description_main.php

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 11:27:27 UTC

Technical Analysis

CVE-2024-28678 identifies a Cross-Site Request Forgery (CSRF) vulnerability in DedeCMS version 5.7, specifically within the /dede/article_description_main.php component. CSRF vulnerabilities occur when a web application does not adequately verify that requests originate from legitimate users, allowing attackers to craft malicious web pages that cause authenticated users to unknowingly execute unwanted actions. In this case, the vulnerability enables attackers to induce authenticated users of DedeCMS to perform unauthorized operations that may alter article descriptions or related content. The vulnerability has a CVSS 3.1 base score of 6.3, indicating medium severity, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but requiring user interaction. The impact affects confidentiality, integrity, and availability to a limited extent, as unauthorized changes could expose or modify sensitive content or disrupt website functionality. No patches or exploit code have been publicly released yet, but the vulnerability is publicly disclosed and should be addressed promptly. DedeCMS is a widely used content management system in China and some Asian countries, making websites using this platform potential targets. The vulnerability falls under CWE-352, a common web security weakness related to CSRF. Mitigation involves implementing anti-CSRF tokens, validating HTTP Referer headers, or applying security updates once available.

Potential Impact

The potential impact of CVE-2024-28678 includes unauthorized modification of website content, leading to integrity violations and possible exposure of sensitive information, thus affecting confidentiality. Availability could also be impacted if attackers manipulate content to disrupt normal website operations or deface pages. Since the vulnerability requires user interaction but no authentication or privileges, attackers can target any authenticated user, including administrators or editors, increasing the risk of significant damage. Organizations relying on DedeCMS for content management may face reputational damage, data integrity issues, and operational disruptions if exploited. The lack of known exploits in the wild currently reduces immediate risk, but the public disclosure increases the likelihood of future exploitation attempts. Given DedeCMS’s market penetration primarily in China and some Asian countries, organizations in these regions are at higher risk. The vulnerability also poses a risk to any international organizations using DedeCMS for web content, especially those with less mature security controls. Overall, the threat could facilitate unauthorized content changes, data leakage, or service interruptions.

Mitigation Recommendations

To mitigate CVE-2024-28678, organizations should implement robust anti-CSRF protections such as synchronizer tokens (CSRF tokens) embedded in forms and validated on the server side to ensure requests originate from legitimate users. Validating the HTTP Referer or Origin headers can provide additional verification of request legitimacy. Administrators should monitor web server logs and application activity for unusual or unauthorized requests targeting the /dede/article_description_main.php endpoint. Applying security patches or updates from DedeCMS vendors as soon as they become available is critical. If patches are not yet released, consider temporarily disabling or restricting access to the vulnerable component or implementing web application firewall (WAF) rules to block suspicious CSRF attempts. Educating users about the risks of clicking on untrusted links while authenticated can reduce the likelihood of successful exploitation. Regular security assessments and penetration testing focusing on CSRF and related web vulnerabilities will help identify and remediate weaknesses proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d95b7ef31ef0b588eb0

Added to database: 2/25/2026, 9:45:57 PM

Last enriched: 2/26/2026, 11:27:27 AM

Last updated: 4/12/2026, 6:10:35 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses