Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-44023: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in abcapp ABCApp Creator

0
Unknown
VulnerabilityCVE-2024-44023cvecve-2024-44023
Published: Sat Oct 05 2024 (10/05/2024, 12:17:52 UTC)
Source: CVE Database V5
Vendor/Project: abcapp
Product: ABCApp Creator

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in abcapp ABCApp Creator abcapp-creator.This issue affects ABCApp Creator: from n/a through <= 1.1.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 05:44:41 UTC

Technical Analysis

CVE-2024-44023 is a Remote File Inclusion (RFI) vulnerability identified in the PHP application ABCApp Creator, specifically affecting versions up to and including 1.1.2. The vulnerability stems from improper validation and control over filenames used in PHP's include or require statements, which are functions that incorporate and execute code from specified files. When these filenames are not properly sanitized, an attacker can manipulate the input to include a remote file hosted on an attacker-controlled server. This leads to arbitrary code execution within the context of the web server, potentially allowing the attacker to execute malicious scripts, escalate privileges, access sensitive data, or pivot within the network. The vulnerability was reserved in August 2024 and published in October 2024, with no CVSS score assigned yet and no known public exploits. The lack of a patch link suggests that a fix may not be publicly available at the time of reporting. The vulnerability is critical because it allows unauthenticated remote attackers to execute arbitrary code without user interaction, affecting the confidentiality, integrity, and availability of the affected systems. ABCApp Creator is a PHP-based application, and the vulnerability exploits a common weakness in PHP applications related to insecure file inclusion practices.

Potential Impact

The impact of CVE-2024-44023 is significant for organizations using ABCApp Creator, as successful exploitation can lead to full system compromise. Attackers can execute arbitrary code remotely, potentially leading to data breaches, unauthorized access to sensitive information, defacement of websites, deployment of ransomware, or use of the compromised system as a pivot point for further attacks within the network. The vulnerability affects the confidentiality, integrity, and availability of the affected systems. Organizations relying on ABCApp Creator for critical business functions may face operational disruptions and reputational damage. Since the vulnerability requires no authentication and no user interaction, it can be exploited at scale by automated attacks, increasing the risk of widespread compromise. The absence of known exploits in the wild currently provides a limited window for proactive mitigation before potential attackers develop and deploy exploit code.

Mitigation Recommendations

To mitigate CVE-2024-44023, organizations should first verify if they are running vulnerable versions of ABCApp Creator (versions up to 1.1.2) and prioritize upgrading to a patched version once available. In the absence of an official patch, immediate mitigations include disabling the PHP directive allow_url_include to prevent remote file inclusion, and setting allow_url_fopen to off to reduce the risk of remote file access. Implement strict input validation and sanitization on all parameters used in include or require statements to ensure only trusted, local files are referenced. Employ web application firewalls (WAFs) with rules designed to detect and block suspicious file inclusion attempts. Monitor web server logs and application behavior for unusual requests or errors related to file inclusion. Restrict file system permissions to limit the web server's ability to execute or write files outside designated directories. Finally, conduct regular security assessments and code reviews to identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-08-18T21:58:06.273Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd747be6bfc5ba1def7ae4

Added to database: 4/1/2026, 7:39:39 PM

Last enriched: 4/2/2026, 5:44:41 AM

Last updated: 4/6/2026, 11:30:49 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses