Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40543: n/a

0
Medium
VulnerabilityCVE-2024-40543cvecve-2024-40543
Published: Fri Jul 12 2024 (07/12/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

PublicCMS v4.0.202302.e was discovered to contain a Server-Side Request Forgery (SSRF) via the component /admin/ueditor?action=catchimage.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:25:16 UTC

Technical Analysis

CVE-2024-40543 is a Server-Side Request Forgery (SSRF) vulnerability identified in PublicCMS version 4.0.202302.e, specifically within the /admin/ueditor?action=catchimage endpoint. SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted HTTP requests to arbitrary destinations, often internal or protected network resources that are otherwise inaccessible externally. In this case, the vulnerability resides in the image capture functionality of the UEditor component used in the administrative interface, which processes URLs to fetch images. An attacker with low-level privileges and no user interaction can exploit this flaw to coerce the server into making unauthorized requests. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) indicates network attack vector, low attack complexity, requiring privileges, no user interaction, with a scope change and limited confidentiality and integrity impacts but no availability impact. The scope change means the vulnerability affects resources beyond the initially vulnerable component, potentially allowing access to internal services or sensitive data. Although no known exploits are currently reported, the vulnerability poses a risk of internal network reconnaissance, data leakage, or manipulation of server-side operations. No patches have been officially released yet, so mitigation relies on configuration changes and monitoring. The CWE-918 classification confirms the SSRF nature of the flaw. Organizations using PublicCMS in administrative roles should prioritize risk assessment and mitigation to prevent exploitation.

Potential Impact

The primary impact of CVE-2024-40543 is on confidentiality and integrity of data accessible via the vulnerable PublicCMS server. An attacker exploiting this SSRF vulnerability can make the server perform arbitrary HTTP requests, potentially accessing internal network resources, sensitive backend services, or metadata endpoints that are not exposed externally. This can lead to unauthorized information disclosure, such as internal IP addresses, service configurations, or sensitive data stored behind firewalls. Additionally, the attacker might manipulate server-side operations by sending crafted requests, potentially altering data or triggering unintended actions. Although availability is not directly affected, the breach of confidentiality and integrity can have significant downstream effects, including facilitating further attacks like privilege escalation or lateral movement within an organization’s network. The requirement for low privileges and no user interaction lowers the barrier for exploitation once an attacker gains some authenticated access, increasing the risk in environments where administrative interfaces are exposed or credentials are compromised. Organizations relying on PublicCMS for web content management, especially those with sensitive internal networks, face increased risk of internal reconnaissance and data leakage.

Mitigation Recommendations

1. Restrict access to the /admin/ueditor endpoint to trusted administrative IP addresses or VPNs to reduce exposure. 2. Implement strict input validation and URL whitelisting on the catchimage parameter to prevent requests to internal or sensitive network addresses. 3. Employ network segmentation and firewall rules to limit the server’s ability to make outbound HTTP requests to internal services that should not be accessible. 4. Monitor server logs for unusual outbound requests originating from the vulnerable endpoint to detect potential exploitation attempts. 5. Use Web Application Firewalls (WAFs) with rules designed to detect and block SSRF patterns targeting the catchimage functionality. 6. Regularly audit and rotate administrative credentials to reduce risk from compromised accounts. 7. Stay alert for official patches or updates from PublicCMS and apply them promptly once available. 8. Consider disabling or restricting the image capture feature if it is not essential to reduce the attack surface. 9. Conduct internal penetration testing to identify if the vulnerability can be exploited in your environment and validate mitigations. 10. Educate administrators about the risks of SSRF and the importance of secure configuration and credential management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cadb7ef31ef0b567fcc

Added to database: 2/25/2026, 9:42:05 PM

Last enriched: 2/28/2026, 5:25:16 AM

Last updated: 4/12/2026, 3:45:03 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses