Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40328: n/a

0
Medium
VulnerabilityCVE-2024-40328cvecve-2024-40328
Published: Wed Jul 10 2024 (07/10/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/memberOnline_deal.php?mudi=del&dataType=&dataID=6

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:15:56 UTC

Technical Analysis

CVE-2024-40328 identifies a Cross-Site Request Forgery (CSRF) vulnerability in idccms version 1.35, specifically in the administrative endpoint /admin/memberOnline_deal.php with parameters mudi=del&dataType=&dataID=6. CSRF vulnerabilities occur when a web application does not properly verify that requests to perform state-changing operations originate from legitimate users. In this case, an attacker can craft a malicious link or webpage that, when visited by an authenticated administrator, triggers unintended actions such as deleting online member data. The vulnerability requires user interaction (the admin must visit a malicious page) but does not require prior authentication or elevated privileges beyond those of the admin user. The CVSS 3.1 base score of 6.3 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, user interaction required, and impacts on confidentiality, integrity, and availability rated as low. No patches or fixes have been published yet, and no known exploits are reported in the wild. The vulnerability is classified under CWE-352, which covers CSRF issues. The lack of CSRF tokens or other anti-CSRF mechanisms in the affected endpoint allows attackers to bypass protections and manipulate administrative functions remotely.

Potential Impact

The primary impact of this vulnerability is unauthorized execution of administrative actions by attackers leveraging CSRF attacks. This can lead to unauthorized deletion or modification of member data, potentially disrupting service availability and compromising data integrity. Confidentiality impact is limited but possible if administrative actions expose sensitive information. Organizations using idccms 1.35 risk operational disruption, data loss, and potential reputational damage if attackers exploit this vulnerability. Since the attack requires an authenticated administrator to interact with malicious content, the scope is somewhat limited but still significant in environments with multiple administrators or where phishing risks are high. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as exploit code could be developed. Overall, the vulnerability poses a moderate risk to organizations relying on idccms for content management and user administration.

Mitigation Recommendations

To mitigate CVE-2024-40328, organizations should implement robust anti-CSRF protections in idccms, including adding unique, unpredictable CSRF tokens to all state-changing requests, especially in administrative endpoints like /admin/memberOnline_deal.php. Validate the presence and correctness of these tokens server-side before processing requests. Additionally, enforce strict referer or origin header checks to ensure requests originate from trusted sources. Limit the exposure of administrative interfaces by restricting access via IP whitelisting or VPNs where feasible. Educate administrators about the risks of phishing and social engineering attacks that could lead to inadvertent execution of malicious requests. Monitor logs for unusual administrative actions and consider implementing multi-factor authentication to reduce the risk of compromised credentials. Until an official patch is released, consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attempts targeting the vulnerable endpoint.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ca6b7ef31ef0b567322

Added to database: 2/25/2026, 9:41:58 PM

Last enriched: 2/28/2026, 5:15:56 AM

Last updated: 4/12/2026, 3:34:09 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses