Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39063: n/a

0
High
VulnerabilityCVE-2024-39063cvecve-2024-39063
Published: Tue Jul 09 2024 (07/09/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-39063 is a high-severity Cross Site Request Forgery (CSRF) vulnerability affecting Lime Survey versions up to 6. 5. 12. The vulnerability arises because the YII_CSRF_TOKEN validation is only enforced on POST requests when the token is included in the request body, but equivalent GET requests do not undergo this check. This flaw allows attackers to craft malicious GET requests that can perform unauthorized actions on behalf of authenticated users if they visit a specially crafted URL, potentially leading to full compromise of confidentiality, integrity, and availability of the Lime Survey instance. No known exploits are currently reported in the wild. Organizations using affected Lime Survey versions should prioritize patching or applying mitigations to prevent exploitation. The vulnerability has a CVSS 3. 1 score of 8. 8, reflecting its critical impact and ease of exploitation without authentication but requiring user interaction.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:46:21 UTC

Technical Analysis

CVE-2024-39063 identifies a critical Cross Site Request Forgery (CSRF) vulnerability in Lime Survey versions up to 6.5.12. Lime Survey uses the Yii framework's CSRF protection mechanism, which relies on the YII_CSRF_TOKEN to validate requests and prevent unauthorized actions. However, this vulnerability stems from an implementation flaw where the CSRF token validation is only performed on POST requests when the token is included in the request body. Equivalent GET requests do not undergo the same token validation, creating an attack vector. An attacker can exploit this by tricking an authenticated user into visiting a maliciously crafted URL that issues a GET request performing sensitive actions without the user's consent. Since GET requests are often considered safe and may be cached or logged, this oversight bypasses the intended CSRF protections. The vulnerability impacts confidentiality, integrity, and availability, as unauthorized actions could include data modification, deletion, or leakage. The CVSS 3.1 score of 8.8 reflects the vulnerability's network attack vector, low attack complexity, no privileges required, but requiring user interaction. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. This vulnerability is categorized under CWE-352, which covers CSRF attacks. Organizations running Lime Survey should urgently review their exposure and apply mitigations or updates once available.

Potential Impact

The impact of CVE-2024-39063 is significant for organizations using Lime Survey up to version 6.5.12. Successful exploitation allows attackers to perform unauthorized actions on behalf of authenticated users by leveraging the missing CSRF token validation on GET requests. This can lead to unauthorized data access, modification, or deletion, compromising the confidentiality, integrity, and availability of survey data and potentially the broader systems integrated with Lime Survey. Given Lime Survey's use in academic, governmental, and commercial environments for collecting sensitive information, the breach of survey data can have legal, reputational, and operational consequences. Attackers could manipulate survey results, disrupt data collection processes, or exfiltrate sensitive information. The requirement for user interaction (visiting a malicious link) makes social engineering a likely attack vector. The vulnerability's network accessibility and lack of required privileges increase the risk of widespread exploitation once a public exploit emerges. Organizations globally relying on Lime Survey for critical data collection are at risk until mitigations or patches are applied.

Mitigation Recommendations

To mitigate CVE-2024-39063, organizations should implement the following specific actions: 1) Immediately restrict access to Lime Survey instances to trusted networks or VPNs to reduce exposure. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious GET requests that attempt to perform state-changing actions or include parameters typically protected by CSRF tokens. 3) Educate users and administrators to avoid clicking on untrusted links and to verify URLs before accessing Lime Survey resources. 4) Monitor server logs for unusual GET request patterns that could indicate exploitation attempts. 5) If possible, configure Lime Survey or the underlying Yii framework to enforce CSRF token validation on all state-changing requests, including GET requests, through custom code or middleware. 6) Regularly check for official patches or updates from Lime Survey and apply them promptly once released. 7) Consider implementing multi-factor authentication (MFA) to reduce the impact of compromised sessions. 8) Conduct security assessments and penetration tests to verify the effectiveness of mitigations. These measures go beyond generic advice by focusing on compensating controls and proactive detection until an official patch is available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c81b7ef31ef0b565b63

Added to database: 2/25/2026, 9:41:21 PM

Last enriched: 2/26/2026, 5:46:21 AM

Last updated: 2/26/2026, 8:01:49 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats