Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4447: CWE-863 Incorrect Authorization in dotCMS dotCMS core

0
Critical
VulnerabilityCVE-2024-4447cvecve-2024-4447cwe-863
Published: Fri Jul 26 2024 (07/26/2024, 02:02:32 UTC)
Source: CVE Database V5
Vendor/Project: dotCMS
Product: dotCMS core

Description

In the System → Maintenance tool, the Logged Users tab surfaces sessionId data for all users via the Direct Web Remoting API (UserSessionAjax.getSessionList.dwr) calls. While this is information that would and should be available to admins who possess "Sign In As" powers, admins who otherwise lack this privilege would still be able to utilize the session IDs to imitate other users. While this is a very small attack vector that requires very high permissions to execute, its danger lies principally in obfuscating attribution; all Sign In As operations are attributed appropriately in the log files, and a malicious administrator could use this information to render their dealings untraceable — including those admins who have not been granted this ability — such as by using a session ID to generate an API token. Fixed in: 24.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS This was the original found by researcher Zakaria Agharghar. 2. Later, on October 20, 2025, another researcher (Chris O’Neill) found additional affected DWR Endpoints that are vulnerable to Information Disclosure, namely and in addition to the original found of "UserSessionAjax.getSessionList.dwr - Session ID exposure": * UserAjax.getUsersList.dwr - Enumerate all users with IDs, names, emails * RoleAjax.getUserRole.dwr - Get user role information * RoleAjax.getRole.dwr - Get role details * RoleAjax.getRolePermissions.dwr - View role permissions * RoleAjax.isPermissionableInheriting.dwr - Check permission inheritance * RoleAjax.getCurrentCascadePermissionsJobs.dwr - View permission cascade jobs * ThreadMonitorTool.getThreads.dwr - Monitor system threads; and, * CRITICAL - Privilege Escalation: RoleAjax.saveRolePermission.dwr - Modify role permissions Overall CVSS for the above findings: * CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L * Score: 9.1 (Critical)

AI-Powered Analysis

AILast updated: 01/29/2026, 10:57:09 UTC

Technical Analysis

CVE-2024-4447 is an incorrect authorization vulnerability (CWE-863) in the dotCMS core content management system, specifically affecting version 4.2.1. The vulnerability arises from improper access controls on the System → Maintenance tool’s Logged Users tab, which exposes sessionId data for all users through the Direct Web Remoting (DWR) API endpoint UserSessionAjax.getSessionList.dwr. While session information should only be accessible to administrators with explicit "Sign In As" privileges, this flaw allows any administrator with lesser privileges to retrieve session IDs and impersonate other users by hijacking their sessions. This impersonation bypasses normal logging and attribution mechanisms, enabling malicious admins to perform unauthorized actions without traceability. Further research uncovered additional vulnerable DWR endpoints that leak sensitive information such as user lists, roles, permissions, and system thread information. Critically, the RoleAjax.saveRolePermission.dwr endpoint allows privilege escalation by modifying role permissions, potentially granting attackers full administrative control. The vulnerability is remotely exploitable over the network without user interaction but requires some level of administrative privileges. The CVSS 3.1 base score is 9.9 (critical), reflecting the high confidentiality, integrity, and limited availability impacts, combined with low attack complexity and no user interaction. The vendor has released patches in dotCMS versions 24.07.12, 23.01.20 LTS, 23.10.24v13 LTS, and 24.04.24v5 LTS to remediate these issues. No known exploits in the wild have been reported yet.

Potential Impact

For European organizations using dotCMS core, this vulnerability poses a severe risk to the confidentiality and integrity of their content management systems. Attackers with limited administrative privileges can escalate their access, impersonate other users, and modify role permissions, potentially gaining full control over the CMS environment. This can lead to unauthorized content changes, data leakage of sensitive user and role information, and disruption of services. The ability to obfuscate attribution complicates incident response and forensic investigations, increasing the risk of prolonged undetected compromise. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face heightened compliance risks and potential legal consequences if exploited. The vulnerability's network accessibility and critical severity make it a prime target for insider threats and attackers who have gained partial access, emphasizing the need for immediate remediation to protect European digital assets and maintain trust.

Mitigation Recommendations

European organizations should promptly upgrade dotCMS core to the fixed versions: 24.07.12, 23.01.20 LTS, 23.10.24v13 LTS, or 24.04.24v5 LTS. Until patching is complete, restrict administrative access to the CMS to only fully trusted personnel and enforce strict role-based access controls to minimize the number of users with elevated privileges. Monitor and audit all administrative actions closely, focusing on unusual session activity or role permission changes. Disable or restrict access to the vulnerable DWR API endpoints if possible, using web application firewalls or API gateways to block unauthorized calls. Implement multi-factor authentication for all admin accounts to reduce the risk of credential compromise. Regularly review and update user roles and permissions to ensure least privilege principles are enforced. Finally, maintain comprehensive logging and ensure logs are protected from tampering to aid in detection and forensic analysis.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
dotCMS
Date Reserved
2024-05-02T19:24:56.680Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697b39a8ac063202227f4977

Added to database: 1/29/2026, 10:42:48 AM

Last enriched: 1/29/2026, 10:57:09 AM

Last updated: 2/7/2026, 7:32:27 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats