Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40551: n/a

0
Medium
VulnerabilityCVE-2024-40551cvecve-2024-40551
Published: Fri Jul 12 2024 (07/12/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An arbitrary file upload vulnerability in the component /admin/cmsTemplate/doUpload of PublicCMS v4.0.202302.e allows attackers to execute arbitrary code via uploading a crafted file.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:26:31 UTC

Technical Analysis

CVE-2024-40551 identifies a vulnerability in PublicCMS version 4.0.202302.e, specifically within the /admin/cmsTemplate/doUpload endpoint. This vulnerability is categorized as an arbitrary file upload flaw (CWE-434), which allows attackers to upload malicious files without proper validation or restrictions. Exploiting this flaw enables attackers to execute arbitrary code on the affected system, potentially leading to system compromise or unauthorized control. The vulnerability requires local access (AV:L) but does not require privileges (PR:N) or user interaction (UI:N), making it accessible to any local user or attacker who can reach the upload endpoint. The CVSS 3.1 base score is 6.2, reflecting a medium severity level primarily due to the attack vector being local. The impact affects integrity (I:H) but not confidentiality or availability. No patches or known exploits are currently available, indicating this is a recently disclosed vulnerability. The lack of authentication requirement for exploitation suggests the upload endpoint is exposed or insufficiently protected. This vulnerability is critical for organizations using PublicCMS for web content management, as it could allow attackers to deploy web shells or other malicious payloads, leading to further compromise.

Potential Impact

The primary impact of CVE-2024-40551 is the potential for arbitrary code execution on servers running vulnerable versions of PublicCMS, which can lead to full system compromise. Attackers could leverage this to deploy web shells, escalate privileges, or pivot within the network. Although the attack vector is local, the lack of authentication and user interaction requirements increases the risk if the upload endpoint is exposed or accessible by unauthorized users. This can undermine the integrity of the web server and hosted applications, potentially leading to data manipulation or defacement. Organizations relying on PublicCMS for critical web services or content management face risks of service disruption, reputational damage, and regulatory non-compliance if exploited. The absence of known exploits suggests limited current active attacks, but the vulnerability's nature makes it a likely target once exploit code becomes available. The medium severity rating reflects the balance between the local attack vector and the high impact on integrity.

Mitigation Recommendations

To mitigate CVE-2024-40551, organizations should first verify if they are running PublicCMS version 4.0.202302.e or similar vulnerable versions. Since no official patches are currently available, immediate steps include restricting access to the /admin/cmsTemplate/doUpload endpoint through network segmentation, firewall rules, or IP whitelisting to limit local or unauthorized access. Implement strict server-side validation of uploaded files, including checking file types, sizes, and content signatures to prevent malicious payloads. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts. Monitor logs for unusual upload activity or execution of unauthorized scripts. Consider disabling file uploads temporarily if feasible until a patch is released. Regularly update PublicCMS and subscribe to vendor advisories for timely patch deployment. Additionally, conduct security audits and penetration testing focused on file upload functionalities to identify and remediate similar weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cadb7ef31ef0b567fdc

Added to database: 2/25/2026, 9:42:05 PM

Last enriched: 2/28/2026, 5:26:31 AM

Last updated: 4/12/2026, 3:38:54 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses