CVE-2024-33749: n/a
CVE-2024-33749 is a critical vulnerability in DedeCMS version 5. 7. 114 that allows unauthenticated remote attackers to delete arbitrary files via the mail_file_manage. php script. The vulnerability requires no user interaction or privileges and can lead to significant integrity and availability impacts by deleting essential files on the server. Although no known exploits are currently reported in the wild, the high CVSS score of 9. 1 reflects the ease of exploitation and potential damage. Organizations using DedeCMS, especially in regions where it is widely deployed, should prioritize patching or applying mitigations to prevent exploitation. This vulnerability falls under CWE-285, indicating improper authorization controls. Defenders should monitor for suspicious requests targeting mail_file_manage.
AI Analysis
Technical Summary
CVE-2024-33749 is a critical security vulnerability identified in DedeCMS version 5.7.114, a popular content management system primarily used in Chinese-speaking regions. The vulnerability exists in the mail_file_manage.php component, which lacks proper authorization checks, allowing unauthenticated remote attackers to delete arbitrary files on the affected server. This flaw is categorized under CWE-285 (Improper Authorization), indicating that the application fails to enforce adequate access controls before performing sensitive operations. The vulnerability has a CVSS 3.1 base score of 9.1, with vector metrics indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), but high integrity (I:H) and availability (A:H) impacts. Exploiting this vulnerability enables attackers to remove critical files, potentially causing denial of service or further compromise by deleting configuration files, scripts, or other essential data. Although no public exploits have been reported yet, the vulnerability's characteristics make it a high-risk issue that could be weaponized quickly once details become widely known. The absence of patches at the time of publication necessitates immediate risk mitigation by affected organizations.
Potential Impact
The primary impact of CVE-2024-33749 is the unauthorized deletion of arbitrary files on servers running vulnerable versions of DedeCMS. This can severely affect the integrity and availability of the affected systems by removing critical application files, configuration data, or other important resources, potentially leading to service disruption or complete denial of service. Since no authentication is required, attackers can exploit this vulnerability remotely over the network without user interaction, increasing the risk of automated mass exploitation. Organizations relying on DedeCMS for web content management may face operational downtime, data loss, and reputational damage. Additionally, deletion of security-related files could facilitate further attacks or complicate incident response efforts. The lack of confidentiality impact means sensitive data exposure is unlikely, but the high integrity and availability impacts justify the critical severity rating.
Mitigation Recommendations
Given the absence of an official patch at the time of disclosure, organizations should implement immediate compensating controls to mitigate the risk. These include restricting network access to the mail_file_manage.php script via firewall rules or web server configuration, allowing only trusted IP addresses or internal networks to reach this endpoint. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting file deletion parameters within mail_file_manage.php. Conduct thorough access control reviews to ensure that sensitive scripts are not publicly accessible. Regularly back up critical files and configurations to enable rapid recovery in case of deletion. Monitor web server logs for unusual activity related to mail_file_manage.php and set up alerts for potential exploitation attempts. Once an official patch or update is released by DedeCMS maintainers, apply it promptly. Additionally, consider isolating the CMS environment and employing intrusion detection systems to detect exploitation attempts early.
Affected Countries
China, Taiwan, Singapore, Malaysia, Indonesia, Vietnam, Thailand
CVE-2024-33749: n/a
Description
CVE-2024-33749 is a critical vulnerability in DedeCMS version 5. 7. 114 that allows unauthenticated remote attackers to delete arbitrary files via the mail_file_manage. php script. The vulnerability requires no user interaction or privileges and can lead to significant integrity and availability impacts by deleting essential files on the server. Although no known exploits are currently reported in the wild, the high CVSS score of 9. 1 reflects the ease of exploitation and potential damage. Organizations using DedeCMS, especially in regions where it is widely deployed, should prioritize patching or applying mitigations to prevent exploitation. This vulnerability falls under CWE-285, indicating improper authorization controls. Defenders should monitor for suspicious requests targeting mail_file_manage.
AI-Powered Analysis
Technical Analysis
CVE-2024-33749 is a critical security vulnerability identified in DedeCMS version 5.7.114, a popular content management system primarily used in Chinese-speaking regions. The vulnerability exists in the mail_file_manage.php component, which lacks proper authorization checks, allowing unauthenticated remote attackers to delete arbitrary files on the affected server. This flaw is categorized under CWE-285 (Improper Authorization), indicating that the application fails to enforce adequate access controls before performing sensitive operations. The vulnerability has a CVSS 3.1 base score of 9.1, with vector metrics indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), but high integrity (I:H) and availability (A:H) impacts. Exploiting this vulnerability enables attackers to remove critical files, potentially causing denial of service or further compromise by deleting configuration files, scripts, or other essential data. Although no public exploits have been reported yet, the vulnerability's characteristics make it a high-risk issue that could be weaponized quickly once details become widely known. The absence of patches at the time of publication necessitates immediate risk mitigation by affected organizations.
Potential Impact
The primary impact of CVE-2024-33749 is the unauthorized deletion of arbitrary files on servers running vulnerable versions of DedeCMS. This can severely affect the integrity and availability of the affected systems by removing critical application files, configuration data, or other important resources, potentially leading to service disruption or complete denial of service. Since no authentication is required, attackers can exploit this vulnerability remotely over the network without user interaction, increasing the risk of automated mass exploitation. Organizations relying on DedeCMS for web content management may face operational downtime, data loss, and reputational damage. Additionally, deletion of security-related files could facilitate further attacks or complicate incident response efforts. The lack of confidentiality impact means sensitive data exposure is unlikely, but the high integrity and availability impacts justify the critical severity rating.
Mitigation Recommendations
Given the absence of an official patch at the time of disclosure, organizations should implement immediate compensating controls to mitigate the risk. These include restricting network access to the mail_file_manage.php script via firewall rules or web server configuration, allowing only trusted IP addresses or internal networks to reach this endpoint. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting file deletion parameters within mail_file_manage.php. Conduct thorough access control reviews to ensure that sensitive scripts are not publicly accessible. Regularly back up critical files and configurations to enable rapid recovery in case of deletion. Monitor web server logs for unusual activity related to mail_file_manage.php and set up alerts for potential exploitation attempts. Once an official patch or update is released by DedeCMS maintainers, apply it promptly. Additionally, consider isolating the CMS environment and employing intrusion detection systems to detect exploitation attempts early.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-04-26T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c44b7ef31ef0b561c28
Added to database: 2/25/2026, 9:40:20 PM
Last enriched: 2/26/2026, 4:34:34 AM
Last updated: 2/26/2026, 11:07:50 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighTrend Micro Patches Critical Apex One Vulnerabilities
CriticalCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.