Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33350: n/a

0
Critical
VulnerabilityCVE-2024-33350cvecve-2024-33350
Published: Mon Apr 29 2024 (04/29/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Directory Traversal vulnerability in TaoCMS v.3.0.2 allows a remote attacker to execute arbitrary code and obtain sensitive information via the include/model/file.php component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 02:52:37 UTC

Technical Analysis

CVE-2024-33350 is a directory traversal vulnerability identified in TaoCMS version 3.0.2, specifically within the include/model/file.php component. Directory traversal (CWE-22) vulnerabilities occur when an application fails to properly sanitize user-supplied input used to reference files or directories, allowing attackers to manipulate file paths to access files outside the intended directory. In this case, the vulnerability enables remote attackers to include arbitrary files, leading to arbitrary code execution and unauthorized disclosure of sensitive information. The vulnerability requires no authentication or user interaction, making it highly exploitable over the network. The CVSS 3.1 base score of 9.8 reflects the critical nature of this flaw, with attack vector being network-based, low attack complexity, no privileges required, and no user interaction needed. The impact covers confidentiality, integrity, and availability, as attackers can execute code remotely, potentially taking full control of the affected system. Although no public exploits are currently known, the severity and ease of exploitation make this a high-priority issue for TaoCMS users. The lack of available patches at the time of publication increases the urgency for organizations to implement interim mitigations and monitor for updates from the vendor.

Potential Impact

The vulnerability allows attackers to execute arbitrary code remotely and access sensitive files, which can lead to full system compromise. This threatens the confidentiality of sensitive data stored or processed by TaoCMS, the integrity of website content and backend systems, and the availability of services if attackers disrupt operations or deploy ransomware. Organizations relying on TaoCMS for content management, especially those handling sensitive or regulated data, face risks of data breaches, defacement, and operational downtime. The exploitability without authentication or user interaction increases the likelihood of automated attacks and widespread exploitation once public exploits emerge. This can result in significant reputational damage, financial losses, and regulatory penalties for affected organizations worldwide.

Mitigation Recommendations

1. Immediately monitor TaoCMS vendor channels for official patches or updates addressing CVE-2024-33350 and apply them as soon as they become available. 2. Until patches are released, restrict access to the include/model/file.php component via web server configuration or firewall rules to trusted IP addresses only. 3. Implement web application firewall (WAF) rules to detect and block directory traversal patterns and suspicious file inclusion attempts targeting TaoCMS. 4. Conduct thorough code reviews and input validation enhancements to ensure all file path inputs are properly sanitized and canonicalized. 5. Regularly audit server logs for unusual access patterns or attempts to exploit file inclusion vulnerabilities. 6. Employ network segmentation to isolate critical CMS infrastructure and limit lateral movement in case of compromise. 7. Educate administrators and developers about the risks of directory traversal and secure coding practices to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-23T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c3fb7ef31ef0b5618cc

Added to database: 2/25/2026, 9:40:15 PM

Last enriched: 2/28/2026, 2:52:37 AM

Last updated: 4/12/2026, 3:34:08 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses