Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4447: CWE-863 Incorrect Authorization in dotCMS dotCMS core

0
Critical
VulnerabilityCVE-2024-4447cvecve-2024-4447cwe-863
Published: Fri Jul 26 2024 (07/26/2024, 02:02:32 UTC)
Source: CVE Database V5
Vendor/Project: dotCMS
Product: dotCMS core

Description

CVE-2024-4447 is a critical authorization vulnerability in dotCMS core affecting version 4. 2. 1, allowing privileged but non-fully authorized administrators to access session IDs and impersonate other users via exposed Direct Web Remoting (DWR) API endpoints. The flaw enables malicious admins to obfuscate attribution by using session IDs to generate API tokens, bypassing normal audit trails. Additional DWR endpoints were later found vulnerable to information disclosure and privilege escalation, including the ability to enumerate users, roles, permissions, and critically, to modify role permissions. The vulnerability has a CVSS score of 9. 9, reflecting its high impact on confidentiality, integrity, and availability without requiring user interaction. Although exploitation requires some level of privilege, the scope and severity make it a significant threat to organizations using dotCMS. Patches have been released in recent dotCMS versions to address these issues.

AI-Powered Analysis

AILast updated: 01/29/2026, 10:57:09 UTC

Technical Analysis

CVE-2024-4447 is an incorrect authorization vulnerability (CWE-863) in the dotCMS core content management system, specifically affecting version 4.2.1. The vulnerability arises from improper access controls on the System → Maintenance tool’s Logged Users tab, which exposes sessionId data for all users through the Direct Web Remoting (DWR) API endpoint UserSessionAjax.getSessionList.dwr. While session information should only be accessible to administrators with explicit "Sign In As" privileges, this flaw allows any administrator with lesser privileges to retrieve session IDs and impersonate other users by hijacking their sessions. This impersonation bypasses normal logging and attribution mechanisms, enabling malicious admins to perform unauthorized actions without traceability. Further research uncovered additional vulnerable DWR endpoints that leak sensitive information such as user lists, roles, permissions, and system thread information. Critically, the RoleAjax.saveRolePermission.dwr endpoint allows privilege escalation by modifying role permissions, potentially granting attackers full administrative control. The vulnerability is remotely exploitable over the network without user interaction but requires some level of administrative privileges. The CVSS 3.1 base score is 9.9 (critical), reflecting the high confidentiality, integrity, and limited availability impacts, combined with low attack complexity and no user interaction. The vendor has released patches in dotCMS versions 24.07.12, 23.01.20 LTS, 23.10.24v13 LTS, and 24.04.24v5 LTS to remediate these issues. No known exploits in the wild have been reported yet.

Potential Impact

For European organizations using dotCMS core, this vulnerability poses a severe risk to the confidentiality and integrity of their content management systems. Attackers with limited administrative privileges can escalate their access, impersonate other users, and modify role permissions, potentially gaining full control over the CMS environment. This can lead to unauthorized content changes, data leakage of sensitive user and role information, and disruption of services. The ability to obfuscate attribution complicates incident response and forensic investigations, increasing the risk of prolonged undetected compromise. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face heightened compliance risks and potential legal consequences if exploited. The vulnerability's network accessibility and critical severity make it a prime target for insider threats and attackers who have gained partial access, emphasizing the need for immediate remediation to protect European digital assets and maintain trust.

Mitigation Recommendations

European organizations should promptly upgrade dotCMS core to the fixed versions: 24.07.12, 23.01.20 LTS, 23.10.24v13 LTS, or 24.04.24v5 LTS. Until patching is complete, restrict administrative access to the CMS to only fully trusted personnel and enforce strict role-based access controls to minimize the number of users with elevated privileges. Monitor and audit all administrative actions closely, focusing on unusual session activity or role permission changes. Disable or restrict access to the vulnerable DWR API endpoints if possible, using web application firewalls or API gateways to block unauthorized calls. Implement multi-factor authentication for all admin accounts to reduce the risk of credential compromise. Regularly review and update user roles and permissions to ensure least privilege principles are enforced. Finally, maintain comprehensive logging and ensure logs are protected from tampering to aid in detection and forensic analysis.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
dotCMS
Date Reserved
2024-05-02T19:24:56.680Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697b39a8ac063202227f4977

Added to database: 1/29/2026, 10:42:48 AM

Last enriched: 1/29/2026, 10:57:09 AM

Last updated: 1/29/2026, 2:04:18 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats