Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40035: n/a

0
Medium
VulnerabilityCVE-2024-40035cvecve-2024-40035
Published: Tue Jul 09 2024 (07/09/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-40035 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability found in idccms version 1. 35, specifically affecting the /admin/userLevel_deal. php? mudi=add endpoint. This vulnerability allows an attacker to trick an authenticated administrator into performing unintended actions without their consent, potentially leading to unauthorized changes in user levels. The CVSS 3. 1 base score is 5. 9, reflecting low attack complexity but requiring local access and no user interaction. Although no known exploits are currently reported in the wild, the vulnerability impacts confidentiality, integrity, and availability to a limited extent. Mitigation involves implementing anti-CSRF tokens, validating request origins, and restricting access controls.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:34:57 UTC

Technical Analysis

CVE-2024-40035 identifies a Cross-Site Request Forgery (CSRF) vulnerability in idccms version 1.35, specifically targeting the administrative endpoint /admin/userLevel_deal.php?mudi=add. CSRF vulnerabilities occur when an attacker tricks an authenticated user, typically an administrator, into submitting a forged HTTP request that performs unintended actions on a web application. In this case, the vulnerability allows unauthorized modification of user levels, which could lead to privilege escalation or unauthorized access changes. The CVSS 3.1 vector indicates the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), no user interaction (UI:N), and affects confidentiality, integrity, and availability to a limited degree (C:L/I:L/A:L). The vulnerability is classified under CWE-352, which covers CSRF issues. No patches or exploits are currently documented, but the lack of CSRF protections in the administrative interface exposes the system to potential misuse if an attacker can lure an admin to a malicious site or execute crafted requests. This vulnerability highlights the importance of implementing anti-CSRF tokens, validating HTTP headers such as Origin and Referer, and enforcing strict access controls on sensitive endpoints.

Potential Impact

The primary impact of CVE-2024-40035 is the potential unauthorized modification of user privileges within the idccms administrative interface. Successful exploitation could allow attackers to escalate privileges, create or modify user accounts, or disrupt normal administrative operations, affecting the confidentiality, integrity, and availability of the CMS-managed content and user data. While the attack vector requires local access, the absence of user interaction means that an attacker could exploit this vulnerability through automated or crafted requests if they can induce an authenticated administrator to visit a malicious page or execute a malicious request. This could lead to unauthorized administrative control, data manipulation, or service disruption. Organizations relying on idccms for content management may face risks of data breaches, defacement, or operational downtime. The medium severity score reflects the moderate risk, given the requirement for local access and no known widespread exploitation, but the potential for privilege escalation and administrative compromise remains significant.

Mitigation Recommendations

To mitigate CVE-2024-40035, organizations should implement robust anti-CSRF protections on all administrative endpoints, especially /admin/userLevel_deal.php?mudi=add. This includes generating and validating unique CSRF tokens for each user session and sensitive request to ensure that requests originate from legitimate sources. Additionally, validating the Origin and Referer HTTP headers can help detect and block unauthorized cross-site requests. Access to administrative interfaces should be restricted through network segmentation, IP whitelisting, or VPN requirements to limit exposure. Employing multi-factor authentication (MFA) for administrative accounts further reduces risk. Regularly auditing and monitoring administrative actions can help detect suspicious activities. Since no official patches are currently available, organizations should consider applying custom patches or workarounds to enforce CSRF protections or temporarily disable vulnerable functionalities if feasible. Keeping the CMS and all dependencies updated and following secure coding practices for web applications is essential to prevent similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ca3b7ef31ef0b567174

Added to database: 2/25/2026, 9:41:55 PM

Last enriched: 2/26/2026, 6:34:57 AM

Last updated: 2/26/2026, 8:04:35 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats