Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42607: n/a

0
High
VulnerabilityCVE-2024-42607cvecve-2024-42607
Published: Tue Aug 20 2024 (08/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_backup.php?dobackup=database

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 07:24:32 UTC

Technical Analysis

CVE-2024-42607 identifies a Cross-Site Request Forgery (CSRF) vulnerability in Pligg CMS version 2.0.2, specifically in the administrative backup functionality accessible via /admin/admin_backup.php with the dobackup=database parameter. CSRF vulnerabilities allow attackers to induce authenticated users to perform actions without their consent by exploiting the trust a web application places in the user's browser. In this case, an attacker can craft a malicious web page or link that, when visited by an authenticated administrator, triggers an unintended database backup operation. This can lead to unauthorized data exposure or manipulation, as backups often contain sensitive information. The vulnerability has a CVSS 3.1 base score of 8.8, indicating high severity, with attack vector being network (remote), low attack complexity, no privileges required, but requiring user interaction. The impact covers confidentiality, integrity, and availability, as unauthorized backups could be used to exfiltrate data or disrupt normal CMS operations. No patches or mitigations are currently linked, and no known exploits are reported in the wild. The vulnerability is cataloged under CWE-352, which covers CSRF issues. Given the administrative nature of the affected endpoint, successful exploitation could severely compromise the CMS environment.

Potential Impact

The impact of this vulnerability is significant for organizations using Pligg CMS 2.0.2, especially those relying on the CMS for critical content management and data storage. Unauthorized triggering of database backups can lead to exposure of sensitive data contained within backups, including user information, configuration details, and proprietary content. Attackers may leverage this to exfiltrate data or disrupt backup schedules, potentially causing denial of service or data integrity issues. Since the vulnerability affects administrative functionality, compromise could extend to full CMS control if combined with other weaknesses. The requirement for user interaction (an administrator visiting a malicious page) limits automated exploitation but does not eliminate risk, especially in environments with many administrators or where phishing is feasible. Organizations without strict access controls or monitoring may face data breaches, operational disruption, and reputational damage.

Mitigation Recommendations

To mitigate CVE-2024-42607, organizations should implement the following specific measures: 1) Apply any available patches or updates from Pligg CMS vendors as soon as they are released. 2) If patches are not yet available, implement anti-CSRF tokens on the /admin/admin_backup.php endpoint to validate legitimate requests. 3) Restrict access to the administrative interface by IP whitelisting or VPN-only access to reduce exposure. 4) Educate administrators about phishing risks and the dangers of clicking unknown links while logged into the CMS. 5) Monitor web server logs for unusual requests to the backup endpoint and audit backup operations regularly. 6) Employ Content Security Policy (CSP) headers to limit the ability of malicious sites to execute scripts or send forged requests. 7) Consider disabling or restricting the backup functionality temporarily if it is not critical. These targeted mitigations go beyond generic advice by focusing on the specific vulnerable endpoint and attack vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cc5b7ef31ef0b568f0f

Added to database: 2/25/2026, 9:42:29 PM

Last enriched: 2/26/2026, 7:24:32 AM

Last updated: 4/12/2026, 7:51:43 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses