Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-41304: n/a

0
Medium
VulnerabilityCVE-2024-41304cvecve-2024-41304
Published: Tue Jul 30 2024 (07/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-41304 is an arbitrary file upload vulnerability in WonderCMS version 3. 4. 3, specifically in the uploadFileAction() function. This flaw allows attackers with low privileges to upload crafted SVG files that can lead to arbitrary code execution without user interaction. The vulnerability impacts confidentiality, integrity, and availability to varying degrees, with a CVSS score of 5. 4 (medium severity). There are no known exploits in the wild yet, and no official patches have been released. Organizations using WonderCMS 3. 4. 3 should prioritize mitigating this risk by restricting file upload permissions, validating and sanitizing uploaded files, and monitoring for suspicious activity.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:57:20 UTC

Technical Analysis

CVE-2024-41304 identifies a vulnerability in WonderCMS version 3.4.3 within the uploadFileAction() function, which handles file uploads. The vulnerability allows an attacker with low privileges (PR:L) to upload arbitrary files, specifically crafted SVG files, that can be used to execute arbitrary code on the server. SVG files are XML-based vector images that can contain embedded scripts or malicious payloads if not properly sanitized. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code), indicating that the system fails to properly validate or restrict the content of uploaded files, enabling code injection or execution. The CVSS 3.1 base score is 5.4, reflecting a medium severity with the vector AV:P (physical access), AC:L (low complexity), PR:L (low privileges), UI:N (no user interaction), and impacts on confidentiality (low), integrity (high), and availability (low). The attack does not require user interaction, increasing its risk profile. No patches or fixes have been published yet, and no known exploits have been observed in the wild. This vulnerability could be exploited to gain unauthorized code execution, potentially leading to further compromise of the affected system and its data.

Potential Impact

The vulnerability allows attackers to execute arbitrary code by uploading malicious SVG files, potentially leading to unauthorized access, data manipulation, or disruption of services. Confidentiality impact is low, as the attacker must already have some level of access, but integrity impact is high because arbitrary code execution can alter system files or data. Availability impact is low but possible if the attacker disrupts services or causes system instability. Organizations using WonderCMS 3.4.3 risk server compromise, data breaches, or defacement of websites. The medium CVSS score indicates a moderate threat level, but the lack of required user interaction and low privilege needed to exploit increases the likelihood of exploitation. The absence of known exploits in the wild suggests the threat is emerging but should be addressed proactively to prevent future attacks.

Mitigation Recommendations

1. Immediately restrict file upload permissions to trusted users only and disable file uploads where not necessary. 2. Implement strict server-side validation and sanitization of uploaded files, especially SVGs, to disallow embedded scripts or malicious content. 3. Employ allowlisting of file types and reject all files that do not conform to safe formats. 4. Use web application firewalls (WAFs) to detect and block suspicious file upload attempts. 5. Monitor server logs and file upload directories for unusual activity or unexpected file types. 6. Isolate the CMS environment using containerization or sandboxing to limit the impact of potential code execution. 7. Stay alert for official patches or updates from WonderCMS and apply them promptly once available. 8. Educate administrators and developers about secure file handling practices and the risks of arbitrary file uploads.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cb5b7ef31ef0b568370

Added to database: 2/25/2026, 9:42:13 PM

Last enriched: 2/26/2026, 6:57:20 AM

Last updated: 2/26/2026, 8:01:36 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats