Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39027: n/a

0
High
VulnerabilityCVE-2024-39027cvecve-2024-39027
Published: Fri Jul 05 2024 (07/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

SeaCMS v12.9 has an unauthorized SQL injection vulnerability. The vulnerability is caused by the SQL injection through the cid parameter at /js/player/dmplayer/dmku/index.php?ac=edit, which can cause sensitive database information to be leaked.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/10/2026, 17:30:01 UTC

Technical Analysis

CVE-2024-39027 identifies an unauthorized SQL injection vulnerability in SeaCMS version 12.9. The vulnerability exists due to improper sanitization of the 'cid' parameter in the URL path /js/player/dmplayer/dmku/index.php?ac=edit, which allows attackers to inject malicious SQL code. This injection flaw enables attackers to manipulate backend SQL queries without authentication or user interaction, potentially exposing sensitive database contents such as user credentials, configuration data, or other confidential information. The vulnerability is categorized under CWE-89, which covers SQL injection issues caused by improper input validation. The CVSS 3.1 base score is 7.5, reflecting a high impact on confidentiality with no impact on integrity or availability. The attack vector is network-based with low attack complexity, meaning exploitation can be performed remotely without special privileges. Although no public exploits are currently known, the vulnerability's nature and ease of exploitation make it a critical concern for organizations using SeaCMS v12.9. No official patches or mitigation links are provided yet, emphasizing the need for immediate attention from administrators.

Potential Impact

The primary impact of CVE-2024-39027 is the unauthorized disclosure of sensitive database information, which can lead to data breaches, privacy violations, and potential further compromise of the affected systems. Attackers exploiting this vulnerability can retrieve confidential data such as user credentials, personal information, or internal configuration details, which could facilitate subsequent attacks like privilege escalation or lateral movement. Since the vulnerability does not affect data integrity or availability directly, the immediate risk is data confidentiality loss. However, leaked information could indirectly enable more damaging attacks. Organizations relying on SeaCMS v12.9 for web content management are at risk of reputational damage, regulatory penalties, and operational disruption if sensitive data is exposed. The ease of remote exploitation without authentication increases the threat level globally.

Mitigation Recommendations

1. Immediate mitigation involves restricting access to the vulnerable endpoint (/js/player/dmplayer/dmku/index.php?ac=edit) via web application firewalls (WAFs) or network-level controls to block suspicious requests containing SQL injection patterns targeting the 'cid' parameter. 2. Implement input validation and parameterized queries in the application code to sanitize and properly handle user-supplied input, eliminating injection vectors. 3. Monitor web server and database logs for unusual query patterns or access attempts to the vulnerable URL to detect potential exploitation attempts. 4. If possible, isolate the SeaCMS instance in a segmented network zone to limit exposure. 5. Stay alert for official patches or security advisories from SeaCMS developers and apply updates promptly once available. 6. Conduct a thorough security audit of the CMS and underlying infrastructure to identify and remediate any other potential vulnerabilities. 7. Educate developers and administrators on secure coding practices to prevent similar injection flaws in the future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-06-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a709cdd1a09e29cb586e51

Added to database: 3/3/2026, 4:18:21 PM

Last enriched: 3/10/2026, 5:30:01 PM

Last updated: 4/19/2026, 7:33:10 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses