Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30849: n/a

0
Critical
VulnerabilityCVE-2024-30849cvecve-2024-30849
Published: Fri Apr 05 2024 (04/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Arbitrary file upload vulnerability in Sourcecodester Complete E-Commerce Site v1.0, allows remote attackers to execute arbitrary code via filename parameter in admin/products_photo.php.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 13:56:01 UTC

Technical Analysis

CVE-2024-30849 is an arbitrary file upload vulnerability identified in Sourcecodester Complete E-Commerce Site version 1.0. The vulnerability exists in the admin/products_photo.php script, specifically via the filename parameter, which does not properly validate or sanitize user input. This flaw allows unauthenticated remote attackers to upload arbitrary files, including potentially malicious scripts, to the server. Successful exploitation can lead to remote code execution (RCE), enabling attackers to execute arbitrary commands with the privileges of the web server process. The vulnerability is classified under CWE-98 (Improper Control of Filename for Include/Require Statement in PHP Program), indicating that the application improperly handles file inclusion based on user-supplied input. The CVSS v3.1 base score is 9.8 (critical), reflecting the vulnerability's network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No patches or official fixes have been published as of the report date, and no known exploits have been observed in the wild. However, the criticality and ease of exploitation make this a high-risk vulnerability for organizations using this software. Attackers exploiting this vulnerability could gain full control over the affected web server, leading to data theft, defacement, malware deployment, or pivoting to internal networks.

Potential Impact

The impact of CVE-2024-30849 is severe for organizations deploying Sourcecodester Complete E-Commerce Site v1.0. Exploitation can result in complete system compromise, including unauthorized access to sensitive customer data, financial information, and intellectual property. Attackers can execute arbitrary code, potentially installing backdoors, ransomware, or other malware, disrupting business operations and causing significant reputational damage. The vulnerability affects the confidentiality, integrity, and availability of the affected systems. Given the e-commerce context, this could lead to financial fraud, loss of customer trust, and regulatory penalties under data protection laws. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation. Organizations with internet-facing installations of this software are particularly vulnerable, and the absence of patches increases exposure time. The threat also extends to supply chain risks if attackers use compromised servers as launch points for broader attacks.

Mitigation Recommendations

To mitigate CVE-2024-30849, organizations should immediately restrict access to the admin/products_photo.php script, ideally limiting it to trusted IP addresses or VPN users. Implement strict server-side validation and sanitization of all file upload parameters, especially the filename, to prevent malicious file uploads. Employ allowlists for permitted file types and enforce file size limits. Disable execution permissions on directories used for file uploads to prevent uploaded scripts from running. Monitor web server logs for unusual file upload attempts or suspicious activity. If possible, isolate the e-commerce application in a segmented network zone to limit lateral movement in case of compromise. Organizations should also consider deploying web application firewalls (WAFs) with rules to detect and block arbitrary file upload attempts targeting this vulnerability. Regularly back up critical data and test restoration procedures. Stay alert for official patches or updates from the vendor and apply them promptly once available. Conduct security assessments and penetration testing focused on file upload functionality to identify and remediate similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dcab7ef31ef0b58e756

Added to database: 2/25/2026, 9:46:50 PM

Last enriched: 2/26/2026, 1:56:01 PM

Last updated: 4/12/2026, 3:42:36 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses