Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39156: n/a

0
Low
VulnerabilityCVE-2024-39156cvecve-2024-39156
Published: Thu Jun 27 2024 (06/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-39156 is a Cross-Site Request Forgery (CSRF) vulnerability found in idccms version 1. 35, specifically in the /admin/keyWord_deal. php? mudi=add component. The vulnerability allows an attacker with high privileges to perform unauthorized actions without user interaction by tricking an authenticated administrator into executing unwanted requests. The CVSS score is 3. 8, indicating a low severity level due to the requirement of high privileges and no user interaction needed. There are no known exploits in the wild, and no patches have been published yet. This vulnerability could lead to limited confidentiality and integrity impacts but does not affect availability. Organizations using idccms 1.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:48:54 UTC

Technical Analysis

CVE-2024-39156 identifies a Cross-Site Request Forgery (CSRF) vulnerability in idccms version 1.35, specifically within the administrative component located at /admin/keyWord_deal.php?mudi=add. CSRF vulnerabilities occur when an attacker tricks an authenticated user, typically an administrator, into submitting unauthorized requests to a web application without their consent. In this case, the vulnerability allows an attacker to perform actions that modify keywords or related administrative data by exploiting the lack of proper CSRF protections such as anti-CSRF tokens or same-site request validation. The CVSS 3.1 base score of 3.8 reflects a low severity, primarily because exploitation requires the attacker to have high privileges (authenticated administrator) and no user interaction is needed. The vulnerability impacts confidentiality and integrity to a limited extent, as unauthorized changes to administrative data could occur, but it does not affect system availability. No known public exploits or patches are currently available, indicating that the vulnerability is newly disclosed and not yet actively exploited. The vulnerability is categorized under CWE-352, which is the standard classification for CSRF issues. Given the administrative context, successful exploitation could allow attackers to manipulate backend configurations or data, potentially leading to further security risks if combined with other vulnerabilities or misconfigurations.

Potential Impact

The primary impact of CVE-2024-39156 is the unauthorized modification of administrative data within idccms, which could compromise the integrity and confidentiality of the system's keyword management functions. Although the vulnerability does not directly affect availability, unauthorized changes could lead to misconfigurations or data inconsistencies that degrade system reliability or user trust. Since exploitation requires high privileges (an authenticated administrator), the risk is somewhat mitigated by access controls; however, if an attacker gains administrative credentials or uses social engineering to trick an admin, they could leverage this vulnerability to perform unauthorized actions. This could facilitate further attacks, such as privilege escalation or data leakage, especially in environments where idccms is used to manage critical content or services. Organizations relying on idccms 1.35 should consider the potential for indirect impacts on their operational security and data integrity. The absence of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to prevent future exploitation.

Mitigation Recommendations

To mitigate CVE-2024-39156, organizations should implement robust CSRF protections within the idccms administrative interface. This includes adding anti-CSRF tokens to all state-changing requests, especially those in /admin/keyWord_deal.php?mudi=add, to ensure that requests originate from legitimate sources. Additionally, enforcing same-site cookie attributes and validating the HTTP Referer header can provide supplementary defenses. Restrict administrative access to trusted IP addresses or VPNs to reduce exposure. Regularly audit and monitor administrative actions for unusual activity that could indicate exploitation attempts. Since no official patch is currently available, consider applying custom patches or workarounds that disable or secure the vulnerable endpoint until an official fix is released. Educate administrators about phishing and social engineering risks to prevent credential compromise. Finally, maintain up-to-date backups and incident response plans to recover quickly if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c83b7ef31ef0b565c38

Added to database: 2/25/2026, 9:41:23 PM

Last enriched: 2/26/2026, 5:48:54 AM

Last updated: 2/26/2026, 8:04:27 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats