Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39153: n/a

0
Medium
VulnerabilityCVE-2024-39153cvecve-2024-39153
Published: Thu Jun 27 2024 (06/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-39153 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability found in idccms version 1. 35, specifically in the /admin/info_deal. php component. This vulnerability allows an attacker with authenticated access to trick an administrator into executing unwanted actions without their consent, potentially leading to limited confidentiality, integrity, and availability impacts. Exploitation requires the attacker to have high privileges and no user interaction is needed beyond the administrator visiting a malicious link. There are no known exploits in the wild, and no patches have been published yet. The vulnerability has a CVSS score of 4. 7, reflecting its moderate risk. Organizations using idccms v1. 35 should prioritize implementing CSRF protections and monitoring administrative actions.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:48:04 UTC

Technical Analysis

CVE-2024-39153 is a Cross-Site Request Forgery (CSRF) vulnerability identified in idccms version 1.35, affecting the /admin/info_deal.php endpoint with parameters mudi=del, dataType=news, and dataTypeCN. CSRF vulnerabilities occur when an attacker tricks an authenticated user, typically an administrator, into submitting a forged request to the web application, causing unintended actions without the user's consent. In this case, the vulnerability allows an attacker to perform unauthorized deletion or modification of news-related data within the admin panel. The CVSS 3.1 base score is 4.7, indicating a medium severity level, with the vector AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L. This means the attack can be performed remotely over the network with low attack complexity but requires high privileges (authenticated admin access), no user interaction beyond visiting a crafted URL, and impacts confidentiality, integrity, and availability to a limited extent. No patches or known exploits are currently available, but the vulnerability represents a risk to the integrity and availability of administrative content managed via idccms. The root cause is the lack of proper anti-CSRF tokens or protections in the affected component, allowing state-changing requests to be forged. Mitigation involves implementing CSRF tokens, validating the origin of requests, and restricting administrative access.

Potential Impact

The primary impact of CVE-2024-39153 is on the integrity and availability of administrative content within idccms-managed websites. An attacker who gains authenticated administrative access can exploit this CSRF vulnerability to perform unauthorized actions such as deleting or modifying news data, potentially disrupting website content and operations. Confidentiality impact is limited but possible if sensitive administrative data is exposed or altered. Since exploitation requires high privileges, the threat is mainly to organizations with weak administrative access controls or where administrators might be tricked into visiting malicious links. The vulnerability could lead to defacement, misinformation, or denial of service of content management functions. Organizations relying on idccms for critical web content management may face operational disruptions and reputational damage if exploited. However, the lack of known exploits and the requirement for authenticated access reduce the immediate widespread risk.

Mitigation Recommendations

To mitigate CVE-2024-39153, organizations should implement robust anti-CSRF protections in the idccms admin interface, including the use of unique, unpredictable CSRF tokens for all state-changing requests. Validate the HTTP Referer or Origin headers to ensure requests originate from trusted sources. Restrict administrative access through strong authentication mechanisms, such as multi-factor authentication (MFA), and limit admin privileges to only necessary personnel. Educate administrators about the risks of clicking untrusted links while logged into the admin panel. Monitor administrative logs for unusual or unauthorized actions to detect potential exploitation attempts. If possible, isolate the admin interface behind VPNs or IP whitelisting to reduce exposure. Since no official patches are currently available, consider applying custom code fixes or workarounds to enforce CSRF protections until an official update is released. Regularly check for vendor updates and apply patches promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c83b7ef31ef0b565c2f

Added to database: 2/25/2026, 9:41:23 PM

Last enriched: 2/26/2026, 5:48:04 AM

Last updated: 2/26/2026, 11:08:37 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats