Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33749: n/a

0
Critical
VulnerabilityCVE-2024-33749cvecve-2024-33749
Published: Mon May 06 2024 (05/06/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-33749 is a critical vulnerability in DedeCMS version 5. 7. 114 that allows unauthenticated remote attackers to delete arbitrary files via the mail_file_manage. php script. The vulnerability requires no user interaction or privileges and can lead to significant integrity and availability impacts by deleting essential files on the server. Although no known exploits are currently reported in the wild, the high CVSS score of 9. 1 reflects the ease of exploitation and potential damage. Organizations using DedeCMS, especially in regions where it is widely deployed, should prioritize patching or applying mitigations to prevent exploitation. This vulnerability falls under CWE-285, indicating improper authorization controls. Defenders should monitor for suspicious requests targeting mail_file_manage.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:34:34 UTC

Technical Analysis

CVE-2024-33749 is a critical security vulnerability identified in DedeCMS version 5.7.114, a popular content management system primarily used in Chinese-speaking regions. The vulnerability exists in the mail_file_manage.php component, which lacks proper authorization checks, allowing unauthenticated remote attackers to delete arbitrary files on the affected server. This flaw is categorized under CWE-285 (Improper Authorization), indicating that the application fails to enforce adequate access controls before performing sensitive operations. The vulnerability has a CVSS 3.1 base score of 9.1, with vector metrics indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), but high integrity (I:H) and availability (A:H) impacts. Exploiting this vulnerability enables attackers to remove critical files, potentially causing denial of service or further compromise by deleting configuration files, scripts, or other essential data. Although no public exploits have been reported yet, the vulnerability's characteristics make it a high-risk issue that could be weaponized quickly once details become widely known. The absence of patches at the time of publication necessitates immediate risk mitigation by affected organizations.

Potential Impact

The primary impact of CVE-2024-33749 is the unauthorized deletion of arbitrary files on servers running vulnerable versions of DedeCMS. This can severely affect the integrity and availability of the affected systems by removing critical application files, configuration data, or other important resources, potentially leading to service disruption or complete denial of service. Since no authentication is required, attackers can exploit this vulnerability remotely over the network without user interaction, increasing the risk of automated mass exploitation. Organizations relying on DedeCMS for web content management may face operational downtime, data loss, and reputational damage. Additionally, deletion of security-related files could facilitate further attacks or complicate incident response efforts. The lack of confidentiality impact means sensitive data exposure is unlikely, but the high integrity and availability impacts justify the critical severity rating.

Mitigation Recommendations

Given the absence of an official patch at the time of disclosure, organizations should implement immediate compensating controls to mitigate the risk. These include restricting network access to the mail_file_manage.php script via firewall rules or web server configuration, allowing only trusted IP addresses or internal networks to reach this endpoint. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting file deletion parameters within mail_file_manage.php. Conduct thorough access control reviews to ensure that sensitive scripts are not publicly accessible. Regularly back up critical files and configurations to enable rapid recovery in case of deletion. Monitor web server logs for unusual activity related to mail_file_manage.php and set up alerts for potential exploitation attempts. Once an official patch or update is released by DedeCMS maintainers, apply it promptly. Additionally, consider isolating the CMS environment and employing intrusion detection systems to detect exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c44b7ef31ef0b561c28

Added to database: 2/25/2026, 9:40:20 PM

Last enriched: 2/26/2026, 4:34:34 AM

Last updated: 2/26/2026, 11:07:50 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats