CVE-2024-40332: n/a
CVE-2024-40332 is a Cross-Site Request Forgery (CSRF) vulnerability found in idccms version 1. 35, specifically affecting the /admin/moneyRecord_deal. php? mudi=delRecord endpoint. This vulnerability allows an attacker with low privileges and requiring user interaction to trick an authenticated administrator into performing unauthorized deletion of money records. The vulnerability has a CVSS 3. 1 base score of 6. 8, indicating a medium severity level, with high impact on confidentiality, limited impact on integrity, and low impact on availability. Exploitation requires the victim to be authenticated and interact with a malicious link or page. No known exploits are currently reported in the wild, and no patches have been published yet.
AI Analysis
Technical Summary
CVE-2024-40332 is a CSRF vulnerability identified in idccms version 1.35, a content management system. The flaw exists in the /admin/moneyRecord_deal.php endpoint when accessed with the query parameter mudi=delRecord, which handles deletion of money records. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request without their consent, exploiting the user's active session. In this case, an attacker with low privileges can craft a malicious request that, when executed by an authenticated administrator, deletes financial records without proper authorization. The vulnerability requires user interaction (UI:R) and privileges (PR:L), meaning the attacker must convince a logged-in admin to visit a malicious page or click a crafted link. The CVSS vector (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L) indicates network attack vector, low attack complexity, low privileges required, user interaction needed, unchanged scope, high confidentiality impact, low integrity impact, and low availability impact. Although no public exploits or patches are currently available, the vulnerability poses a significant risk to the confidentiality of sensitive financial data managed by idccms. The CWE-352 classification confirms this is a classic CSRF issue, which can be mitigated by implementing anti-CSRF tokens and proper request validation.
Potential Impact
The primary impact of CVE-2024-40332 is unauthorized deletion of financial records within the idccms administrative interface, potentially leading to loss or exposure of sensitive financial data. Confidentiality is highly impacted because attackers can cause deletion or manipulation of money records, which may contain sensitive transactional information. Integrity is moderately affected since the deletion alters data, though the impact is rated low because the attacker requires some privileges and user interaction. Availability impact is low but present, as deletion of records could disrupt administrative operations or financial reporting. Organizations relying on idccms for financial or administrative management face risks of data loss, compliance violations, and reputational damage if exploited. Since exploitation requires an authenticated administrator to interact with a malicious request, the attack surface is limited but still significant in environments with multiple administrators or less security awareness. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes widely known.
Mitigation Recommendations
To mitigate CVE-2024-40332, organizations should implement the following specific measures: 1) Apply strict anti-CSRF protections such as synchronizer tokens or double-submit cookies on all sensitive state-changing requests, especially those related to financial record deletion. 2) Enforce strong authentication and session management policies to limit unauthorized access to administrative accounts. 3) Implement role-based access controls to restrict deletion privileges to only necessary administrators. 4) Educate administrators about phishing and social engineering risks to reduce the likelihood of falling victim to malicious links or pages. 5) Monitor and log all administrative actions related to money record management to detect suspicious activity promptly. 6) If possible, isolate the administrative interface behind VPNs or IP allowlists to reduce exposure. 7) Regularly review and update the CMS and apply patches once available from the vendor. 8) Consider implementing Content Security Policy (CSP) headers to reduce the risk of malicious script execution. These targeted mitigations go beyond generic advice by focusing on the specific vulnerable endpoint and attack vector.
Affected Countries
China, India, United States, Germany, Brazil, Russia, South Korea, Japan, United Kingdom, France
CVE-2024-40332: n/a
Description
CVE-2024-40332 is a Cross-Site Request Forgery (CSRF) vulnerability found in idccms version 1. 35, specifically affecting the /admin/moneyRecord_deal. php? mudi=delRecord endpoint. This vulnerability allows an attacker with low privileges and requiring user interaction to trick an authenticated administrator into performing unauthorized deletion of money records. The vulnerability has a CVSS 3. 1 base score of 6. 8, indicating a medium severity level, with high impact on confidentiality, limited impact on integrity, and low impact on availability. Exploitation requires the victim to be authenticated and interact with a malicious link or page. No known exploits are currently reported in the wild, and no patches have been published yet.
AI-Powered Analysis
Technical Analysis
CVE-2024-40332 is a CSRF vulnerability identified in idccms version 1.35, a content management system. The flaw exists in the /admin/moneyRecord_deal.php endpoint when accessed with the query parameter mudi=delRecord, which handles deletion of money records. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request without their consent, exploiting the user's active session. In this case, an attacker with low privileges can craft a malicious request that, when executed by an authenticated administrator, deletes financial records without proper authorization. The vulnerability requires user interaction (UI:R) and privileges (PR:L), meaning the attacker must convince a logged-in admin to visit a malicious page or click a crafted link. The CVSS vector (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L) indicates network attack vector, low attack complexity, low privileges required, user interaction needed, unchanged scope, high confidentiality impact, low integrity impact, and low availability impact. Although no public exploits or patches are currently available, the vulnerability poses a significant risk to the confidentiality of sensitive financial data managed by idccms. The CWE-352 classification confirms this is a classic CSRF issue, which can be mitigated by implementing anti-CSRF tokens and proper request validation.
Potential Impact
The primary impact of CVE-2024-40332 is unauthorized deletion of financial records within the idccms administrative interface, potentially leading to loss or exposure of sensitive financial data. Confidentiality is highly impacted because attackers can cause deletion or manipulation of money records, which may contain sensitive transactional information. Integrity is moderately affected since the deletion alters data, though the impact is rated low because the attacker requires some privileges and user interaction. Availability impact is low but present, as deletion of records could disrupt administrative operations or financial reporting. Organizations relying on idccms for financial or administrative management face risks of data loss, compliance violations, and reputational damage if exploited. Since exploitation requires an authenticated administrator to interact with a malicious request, the attack surface is limited but still significant in environments with multiple administrators or less security awareness. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes widely known.
Mitigation Recommendations
To mitigate CVE-2024-40332, organizations should implement the following specific measures: 1) Apply strict anti-CSRF protections such as synchronizer tokens or double-submit cookies on all sensitive state-changing requests, especially those related to financial record deletion. 2) Enforce strong authentication and session management policies to limit unauthorized access to administrative accounts. 3) Implement role-based access controls to restrict deletion privileges to only necessary administrators. 4) Educate administrators about phishing and social engineering risks to reduce the likelihood of falling victim to malicious links or pages. 5) Monitor and log all administrative actions related to money record management to detect suspicious activity promptly. 6) If possible, isolate the administrative interface behind VPNs or IP allowlists to reduce exposure. 7) Regularly review and update the CMS and apply patches once available from the vendor. 8) Consider implementing Content Security Policy (CSP) headers to reduce the risk of malicious script execution. These targeted mitigations go beyond generic advice by focusing on the specific vulnerable endpoint and attack vector.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-07-05T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6ca8b7ef31ef0b567a09
Added to database: 2/25/2026, 9:42:00 PM
Last enriched: 2/26/2026, 6:38:41 AM
Last updated: 2/26/2026, 9:35:03 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.