Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39019: n/a

0
Medium
VulnerabilityCVE-2024-39019cvecve-2024-39019
Published: Fri Jul 05 2024 (07/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/idcProData_deal.php?mudi=del

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:13:42 UTC

Technical Analysis

The vulnerability identified as CVE-2024-39019 affects idccms version 1.35 and is classified as a Cross-Site Request Forgery (CSRF) issue. CSRF vulnerabilities occur when a web application does not properly verify that state-changing requests originate from legitimate users, allowing attackers to trick authenticated users into executing unwanted actions. In this case, the vulnerable endpoint is /admin/idcProData_deal.php with the parameter mudi=del, which likely handles deletion operations within the CMS. Because the application lacks adequate CSRF protections such as anti-CSRF tokens or origin checks, an attacker can craft malicious web pages or links that, when visited by an authenticated administrator, cause unintended deletions or modifications. The CVSS 3.1 vector indicates the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), requires no privileges (PR:N), but does require user interaction (UI:R). The impact affects confidentiality and integrity to a limited degree (C:L, I:L) but does not affect availability (A:N). No patches or official fixes have been released, and no active exploitation has been reported. This vulnerability is categorized under CWE-352, which covers CSRF issues. Given the nature of the vulnerability, it primarily threatens administrative users and the integrity of the CMS data. Organizations using idccms v1.35 should prioritize mitigating this risk to prevent unauthorized data manipulation.

Potential Impact

The primary impact of CVE-2024-39019 is unauthorized modification or deletion of data within the idccms platform by exploiting CSRF. This can lead to loss of data integrity and potential leakage of confidential information if administrative functions are manipulated. Although availability is not directly affected, the unauthorized deletion of content or configuration could disrupt normal operations and require recovery efforts. The attack requires an authenticated administrator to interact with a malicious link or webpage, which means social engineering or phishing techniques could be employed. For organizations relying on idccms for content management, this vulnerability could result in compromised administrative control, data loss, and reputational damage. The absence of known exploits reduces immediate risk, but the vulnerability remains a significant concern until patched. The medium severity rating reflects the moderate impact and ease of exploitation given user interaction is necessary but no privileges or authentication bypass is required.

Mitigation Recommendations

To mitigate CVE-2024-39019, organizations should implement the following specific measures: 1) Apply CSRF tokens to all state-changing requests, especially the /admin/idcProData_deal.php endpoint, ensuring tokens are validated server-side. 2) Enforce strict origin and referer header checks to verify that requests originate from trusted sources. 3) Restrict administrative interface access by IP whitelisting or VPN to reduce exposure. 4) Educate administrators about phishing and social engineering risks to minimize the chance of interacting with malicious links. 5) Monitor logs for unusual deletion requests or patterns indicating CSRF exploitation attempts. 6) If possible, temporarily disable or restrict the vulnerable functionality until an official patch is released. 7) Engage with the vendor or community to obtain or develop patches addressing this vulnerability. 8) Implement Content Security Policy (CSP) headers to reduce the risk of malicious script execution that could facilitate CSRF attacks. These targeted actions go beyond generic advice and focus on reducing the attack surface and preventing unauthorized state changes.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c80b7ef31ef0b565ad6

Added to database: 2/25/2026, 9:41:20 PM

Last enriched: 2/28/2026, 4:13:42 AM

Last updated: 4/12/2026, 7:41:40 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses