Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37858: n/a

0
Critical
VulnerabilityCVE-2024-37858cvecve-2024-37858
Published: Mon Jul 29 2024 (07/29/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-37858 is a critical SQL Injection vulnerability in the Lost and Found Information System 1. 0, specifically in the id parameter of the manage_category. php script located in php-lfis/admin/categories/. This flaw allows remote attackers to escalate privileges without authentication or user interaction. The vulnerability has a CVSS score of 9. 8, indicating high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, and no patches have been published yet. Organizations using this system are at significant risk of unauthorized data access, data manipulation, and potential full system compromise. Immediate mitigation involves restricting access to the vulnerable endpoint, implementing web application firewalls with SQLi detection, and monitoring for suspicious activity. Countries with notable deployments of this system or similar PHP-based administrative tools, especially those with critical infrastructure or governmental use, are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:26:02 UTC

Technical Analysis

CVE-2024-37858 identifies a critical SQL Injection vulnerability in the Lost and Found Information System (LFIS) version 1.0. The vulnerability resides in the id parameter of the manage_category.php script within the administrative interface (php-lfis/admin/categories/). SQL Injection occurs when user-supplied input is improperly sanitized before being incorporated into SQL queries, allowing attackers to manipulate backend database commands. In this case, a remote attacker can exploit the id parameter without any authentication or user interaction, enabling privilege escalation. This means an attacker can gain unauthorized administrative access or execute arbitrary SQL commands, potentially leading to full system compromise. The CVSS 3.1 base score of 9.8 reflects the vulnerability's critical impact across confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no privileges or user interaction required. Although no known exploits have been reported in the wild yet, the vulnerability's nature and accessibility make it a prime target for attackers once exploit code becomes available. The vulnerability is classified under CWE-269 (Improper Privilege Management), highlighting the risk of unauthorized privilege escalation due to insufficient input validation and access control. No official patches or fixes have been released at the time of publication, increasing the urgency for organizations to implement interim mitigations.

Potential Impact

The impact of CVE-2024-37858 is severe for organizations using the Lost and Found Information System 1.0. Exploitation can lead to unauthorized access to sensitive data stored within the system, including potentially personal information about lost and found items and their owners. Attackers can escalate privileges to administrative levels, allowing them to modify, delete, or exfiltrate data, disrupt system operations, or implant persistent backdoors. This can result in data breaches, loss of data integrity, and service outages, severely affecting organizational reputation and operational continuity. Given the administrative nature of the vulnerable endpoint, the scope of damage extends beyond data theft to full system control. Organizations relying on this system in sectors such as public services, transportation hubs, or educational institutions may face regulatory penalties and loss of public trust. The lack of patches and the ease of exploitation increase the risk of widespread attacks once exploit tools become publicly available.

Mitigation Recommendations

To mitigate CVE-2024-37858, organizations should immediately restrict access to the vulnerable manage_category.php endpoint by implementing network-level controls such as IP whitelisting or VPN-only access. Deploy Web Application Firewalls (WAFs) with rules specifically targeting SQL Injection patterns to detect and block malicious payloads targeting the id parameter. Conduct thorough input validation and sanitization on all user inputs, especially those interacting with SQL queries, using parameterized queries or prepared statements. Monitor logs for unusual database query patterns or repeated failed attempts to access administrative functions. If possible, isolate the Lost and Found Information System from critical networks until a vendor patch is available. Engage with the software vendor or community to obtain or develop patches and apply them promptly once released. Additionally, conduct security awareness training for administrators to recognize signs of compromise and enforce strong authentication and authorization policies around administrative interfaces.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c72b7ef31ef0b5641a0

Added to database: 2/25/2026, 9:41:06 PM

Last enriched: 2/26/2026, 5:26:02 AM

Last updated: 2/26/2026, 8:02:17 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats