Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30855: n/a

0
High
VulnerabilityCVE-2024-30855cvecve-2024-30855
Published: Mon Dec 29 2025 (12/29/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

DedeCMS v5.7 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /src/dede/makehtml_list_action.php.

AI-Powered Analysis

AILast updated: 01/07/2026, 00:33:38 UTC

Technical Analysis

CVE-2024-30855 identifies a Cross-Site Request Forgery (CSRF) vulnerability in DedeCMS version 5.7, specifically through the /src/dede/makehtml_list_action.php script. CSRF vulnerabilities allow attackers to induce authenticated users to execute unwanted actions on a web application without their consent. In this case, the attacker can craft malicious web requests that, when visited by an authenticated user, cause the CMS to perform unauthorized operations such as modifying content, generating pages, or altering site configurations. The vulnerability is rated with a CVSS 3.1 score of 8.8, reflecting its high impact on confidentiality, integrity, and availability. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The vulnerability scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The CWE classification is CWE-352, which corresponds to CSRF attacks. No official patches or exploit code are currently published, but the risk remains significant due to the ease of exploitation and potential damage. The vulnerability can lead to unauthorized content changes, defacement, or even denial of service if critical site functions are manipulated. Given DedeCMS's use in various content management scenarios, this vulnerability could be leveraged to compromise website integrity and user trust.

Potential Impact

For European organizations, the impact of CVE-2024-30855 can be substantial, especially for those relying on DedeCMS for public-facing websites or internal portals. Successful exploitation can lead to unauthorized content changes, defacement, or disruption of services, damaging organizational reputation and user trust. Confidential information could be exposed or altered, leading to compliance violations under GDPR if personal data is involved. The availability of web services may be affected if attackers manipulate page generation or site configuration. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to trigger the exploit, increasing the risk. Organizations in sectors such as government, education, media, and e-commerce, which often use CMS platforms, may face heightened risks. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the high CVSS score indicates that once exploited, the consequences could be severe.

Mitigation Recommendations

To mitigate CVE-2024-30855, organizations should first verify if they are running DedeCMS version 5.7 and restrict access to the /src/dede/makehtml_list_action.php endpoint. Implementing anti-CSRF tokens in all state-changing requests is critical to prevent unauthorized actions. Web application firewalls (WAFs) can be configured to detect and block suspicious CSRF patterns or unusual POST requests targeting this endpoint. User sessions should be validated rigorously, including checking the Referer header and enforcing same-site cookies to reduce CSRF attack surface. Organizations should educate users about the risks of clicking on untrusted links while authenticated. Monitoring web server logs for unusual activity related to the vulnerable script can provide early detection of exploitation attempts. If patches become available, immediate application is essential. In the absence of official patches, consider isolating or disabling vulnerable functionality temporarily. Regular security assessments and penetration testing focused on CSRF vulnerabilities will help maintain a secure posture.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-03-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695450b2db813ff03e2bee63

Added to database: 12/30/2025, 10:22:42 PM

Last enriched: 1/7/2026, 12:33:38 AM

Last updated: 2/7/2026, 4:04:20 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats