Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-29684: n/a

0
Critical
VulnerabilityCVE-2024-29684cvecve-2024-29684
Published: Tue Mar 26 2024 (03/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

DedeCMS v5.7 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /src/dede/makehtml_homepage.php allowing a remote attacker to execute arbitrary code.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 11:36:27 UTC

Technical Analysis

CVE-2024-29684 is a critical security vulnerability identified in DedeCMS version 5.7, a content management system widely used for website management. The vulnerability arises from a Cross-Site Request Forgery (CSRF) weakness in the /src/dede/makehtml_homepage.php script. CSRF vulnerabilities allow attackers to trick authenticated users or systems into executing unwanted actions by sending forged requests. In this case, the flaw enables remote attackers to execute arbitrary code on the server without requiring any authentication or user interaction, significantly increasing the risk. The CVSS v3.1 base score of 9.8 indicates a critical severity, with attack vector being network-based (AV:N), no privileges required (PR:N), no user interaction needed (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker can remotely exploit the vulnerability over the internet to gain complete control over the affected system. The vulnerability is categorized under CWE-352 (Cross-Site Request Forgery). No patches or official fixes are currently linked, and no known exploits have been reported in the wild, but the potential for exploitation is high given the nature of the flaw. Organizations running DedeCMS 5.7 should urgently assess their exposure and implement mitigations or monitor for updates from the vendor.

Potential Impact

The impact of CVE-2024-29684 is severe for organizations using DedeCMS 5.7. Successful exploitation allows attackers to execute arbitrary code remotely, potentially leading to full system compromise. This can result in unauthorized data access, data modification or deletion, website defacement, deployment of malware or ransomware, and disruption of services. The vulnerability affects confidentiality, integrity, and availability simultaneously, making it a critical risk. Organizations relying on DedeCMS for public-facing websites or internal portals could face reputational damage, financial losses, and regulatory penalties if exploited. Since no authentication or user interaction is required, the attack surface is broad, increasing the likelihood of automated exploitation attempts. The absence of known exploits in the wild currently provides a window for proactive defense, but the critical nature demands immediate attention.

Mitigation Recommendations

Given the lack of an official patch at this time, organizations should take immediate practical steps to mitigate the risk: 1) Restrict access to the vulnerable /src/dede/makehtml_homepage.php endpoint using web application firewalls (WAFs) or access control lists to block unauthorized requests. 2) Implement CSRF protections such as verifying origin headers or requiring anti-CSRF tokens for sensitive operations if possible. 3) Monitor web server logs for suspicious requests targeting the vulnerable script and unusual POST requests that could indicate exploitation attempts. 4) Isolate or sandbox the affected CMS environment to limit potential damage in case of compromise. 5) Regularly back up website data and configurations to enable rapid recovery. 6) Stay alert for vendor updates or security advisories providing patches or official fixes and apply them immediately upon release. 7) Educate administrators and developers about this vulnerability to avoid unsafe customizations that could exacerbate risk. 8) Consider migrating to alternative CMS platforms if timely patches are not forthcoming and risk remains high.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6da1b7ef31ef0b5898de

Added to database: 2/25/2026, 9:46:09 PM

Last enriched: 2/26/2026, 11:36:27 AM

Last updated: 4/12/2026, 3:35:34 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses