Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28680: n/a

0
Medium
VulnerabilityCVE-2024-28680cvecve-2024-28680
Published: Wed Mar 13 2024 (03/13/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

DedeCMS v5.7 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /dede/diy_add.php.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:26:12 UTC

Technical Analysis

CVE-2024-28680 identifies a Cross-Site Request Forgery (CSRF) vulnerability in DedeCMS version 5.7, specifically via the /dede/diy_add.php endpoint. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application, causing the application to perform unintended actions on behalf of the user. In this case, the vulnerability allows attackers to exploit the lack of proper anti-CSRF tokens or validation mechanisms in the diy_add.php script, enabling unauthorized commands to be executed with the victim's privileges. The CVSS 3.1 vector indicates the attack can be performed remotely over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and has low attack complexity (AC:L). The impact affects confidentiality and integrity partially (C:L/I:L) but does not affect availability (A:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported. The vulnerability is classified under CWE-79, which typically relates to improper neutralization of input leading to cross-site scripting (XSS), but here it is referenced likely due to the CSRF nature involving unauthorized request submission. This vulnerability poses a risk primarily to websites running DedeCMS 5.7 that do not implement additional CSRF protections.

Potential Impact

The primary impact of CVE-2024-28680 is unauthorized actions performed on behalf of authenticated users, potentially leading to data manipulation or unauthorized content changes within DedeCMS-powered websites. Since the vulnerability affects confidentiality and integrity partially, attackers might be able to alter or inject content, which could lead to misinformation, defacement, or unauthorized data disclosure depending on the context of the diy_add.php functionality. However, availability is not impacted, so denial of service is unlikely. The requirement for user interaction limits the ease of exploitation but does not eliminate risk, especially in environments where users are frequently authenticated and may be tricked via phishing or malicious links. Organizations relying on DedeCMS 5.7 for content management, particularly those with high user interaction or public-facing sites, face risks of reputational damage, data integrity issues, and potential downstream attacks leveraging altered content. The absence of known exploits reduces immediate threat but does not preclude future exploitation.

Mitigation Recommendations

To mitigate CVE-2024-28680, organizations should first check for official patches or updates from the DedeCMS development team and apply them promptly once available. In the absence of patches, implement robust anti-CSRF tokens in all forms and state-changing requests, especially those handled by /dede/diy_add.php. Enforce SameSite cookie attributes to restrict cross-origin requests and consider implementing Content Security Policy (CSP) headers to reduce the impact of potential injection attacks. Educate users about phishing and social engineering risks to reduce successful exploitation via user interaction. Additionally, monitor web server logs for unusual POST requests to the vulnerable endpoint and consider deploying Web Application Firewalls (WAFs) with rules to detect and block CSRF attack patterns. Regular security audits and code reviews focusing on input validation and session management can help identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d95b7ef31ef0b588f4a

Added to database: 2/25/2026, 9:45:57 PM

Last enriched: 2/28/2026, 10:26:12 AM

Last updated: 4/11/2026, 9:24:13 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses