CVE-2024-4447: CWE-863 Incorrect Authorization in dotCMS dotCMS core
In the System → Maintenance tool, the Logged Users tab surfaces sessionId data for all users via the Direct Web Remoting API (UserSessionAjax.getSessionList.dwr) calls. While this is information that would and should be available to admins who possess "Sign In As" powers, admins who otherwise lack this privilege would still be able to utilize the session IDs to imitate other users. While this is a very small attack vector that requires very high permissions to execute, its danger lies principally in obfuscating attribution; all Sign In As operations are attributed appropriately in the log files, and a malicious administrator could use this information to render their dealings untraceable — including those admins who have not been granted this ability — such as by using a session ID to generate an API token. Fixed in: 24.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS This was the original found by researcher Zakaria Agharghar. 2. Later, on October 20, 2025, another researcher (Chris O’Neill) found additional affected DWR Endpoints that are vulnerable to Information Disclosure, namely and in addition to the original found of "UserSessionAjax.getSessionList.dwr - Session ID exposure": * UserAjax.getUsersList.dwr - Enumerate all users with IDs, names, emails * RoleAjax.getUserRole.dwr - Get user role information * RoleAjax.getRole.dwr - Get role details * RoleAjax.getRolePermissions.dwr - View role permissions * RoleAjax.isPermissionableInheriting.dwr - Check permission inheritance * RoleAjax.getCurrentCascadePermissionsJobs.dwr - View permission cascade jobs * ThreadMonitorTool.getThreads.dwr - Monitor system threads; and, * CRITICAL - Privilege Escalation: RoleAjax.saveRolePermission.dwr - Modify role permissions Overall CVSS for the above findings: * CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L * Score: 9.1 (Critical)
AI Analysis
Technical Summary
CVE-2024-4447 identifies a critical incorrect authorization vulnerability (CWE-863) in dotCMS core, specifically affecting version 4.2.1 and certain LTS versions. The initial issue involves the System → Maintenance tool's Logged Users tab exposing sessionId data for all users through the Direct Web Remoting (DWR) API endpoint UserSessionAjax.getSessionList.dwr. While session information should be restricted to administrators with 'Sign In As' privileges, the flaw allows any admin, even those lacking this privilege, to obtain session IDs and impersonate other users by hijacking sessions or generating API tokens. This undermines audit logs and attribution, enabling malicious admins to conceal unauthorized actions. Subsequently, additional DWR endpoints were found vulnerable to information disclosure, including UserAjax.getUsersList.dwr (user enumeration), RoleAjax.getUserRole.dwr, RoleAjax.getRole.dwr, RoleAjax.getRolePermissions.dwr, RoleAjax.isPermissionableInheriting.dwr, RoleAjax.getCurrentCascadePermissionsJobs.dwr (role and permission details), and ThreadMonitorTool.getThreads.dwr (system thread monitoring). Critically, RoleAjax.saveRolePermission.dwr allows privilege escalation by modifying role permissions without proper authorization. The combined vulnerabilities allow attackers with limited admin privileges to escalate access, harvest sensitive user and role information, and evade detection. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L) yields a score of 9.9, reflecting network exploitable, low complexity, requiring low privileges but no user interaction, with a scope change and high impact on confidentiality, integrity, and availability. The vulnerability was responsibly disclosed and fixed in dotCMS versions 24.07.12, 23.01.20 LTS, 23.10.24v13 LTS, and 24.04.24v5 LTS.
Potential Impact
The vulnerability poses a severe risk to organizations using dotCMS core, especially those running affected versions. Attackers with limited administrative privileges can impersonate other users, including high-privilege accounts, leading to unauthorized access to sensitive content and administrative functions. The ability to modify role permissions enables privilege escalation, potentially granting full control over the CMS environment. This can result in data breaches, unauthorized content manipulation, disruption of services, and loss of trust. The obfuscation of attribution complicates incident response and forensic investigations, allowing malicious insiders or compromised admins to evade detection. Given dotCMS's use in enterprise content management, e-commerce, and digital experience platforms, exploitation could impact confidentiality, integrity, and availability of critical business data and services. The network-exploitable nature means attackers can leverage this vulnerability remotely, increasing the attack surface. Organizations face risks including compliance violations, reputational damage, and operational disruption.
Mitigation Recommendations
1. Immediately upgrade dotCMS core to the fixed versions: 24.07.12, 23.01.20 LTS, 23.10.24v13 LTS, or 24.04.24v5 LTS as applicable. 2. Restrict administrative access strictly to trusted personnel and enforce the principle of least privilege, ensuring only necessary admins have elevated rights. 3. Audit and monitor usage of 'Sign In As' and other privileged functions to detect anomalous activity. 4. Disable or restrict access to DWR endpoints if not required, or implement network-level controls such as IP whitelisting and web application firewalls to limit exposure. 5. Implement robust logging and alerting on role permission changes and session management activities to detect potential abuse. 6. Conduct regular reviews of user roles and permissions to identify and remediate excessive privileges. 7. Educate administrators on the risks of session ID exposure and the importance of secure session handling. 8. Consider deploying runtime application self-protection (RASP) or endpoint detection solutions to identify exploitation attempts. 9. Perform penetration testing and vulnerability scanning post-patching to verify remediation and detect any residual issues.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Japan, India, Brazil
CVE-2024-4447: CWE-863 Incorrect Authorization in dotCMS dotCMS core
Description
In the System → Maintenance tool, the Logged Users tab surfaces sessionId data for all users via the Direct Web Remoting API (UserSessionAjax.getSessionList.dwr) calls. While this is information that would and should be available to admins who possess "Sign In As" powers, admins who otherwise lack this privilege would still be able to utilize the session IDs to imitate other users. While this is a very small attack vector that requires very high permissions to execute, its danger lies principally in obfuscating attribution; all Sign In As operations are attributed appropriately in the log files, and a malicious administrator could use this information to render their dealings untraceable — including those admins who have not been granted this ability — such as by using a session ID to generate an API token. Fixed in: 24.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS This was the original found by researcher Zakaria Agharghar. 2. Later, on October 20, 2025, another researcher (Chris O’Neill) found additional affected DWR Endpoints that are vulnerable to Information Disclosure, namely and in addition to the original found of "UserSessionAjax.getSessionList.dwr - Session ID exposure": * UserAjax.getUsersList.dwr - Enumerate all users with IDs, names, emails * RoleAjax.getUserRole.dwr - Get user role information * RoleAjax.getRole.dwr - Get role details * RoleAjax.getRolePermissions.dwr - View role permissions * RoleAjax.isPermissionableInheriting.dwr - Check permission inheritance * RoleAjax.getCurrentCascadePermissionsJobs.dwr - View permission cascade jobs * ThreadMonitorTool.getThreads.dwr - Monitor system threads; and, * CRITICAL - Privilege Escalation: RoleAjax.saveRolePermission.dwr - Modify role permissions Overall CVSS for the above findings: * CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L * Score: 9.1 (Critical)
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-4447 identifies a critical incorrect authorization vulnerability (CWE-863) in dotCMS core, specifically affecting version 4.2.1 and certain LTS versions. The initial issue involves the System → Maintenance tool's Logged Users tab exposing sessionId data for all users through the Direct Web Remoting (DWR) API endpoint UserSessionAjax.getSessionList.dwr. While session information should be restricted to administrators with 'Sign In As' privileges, the flaw allows any admin, even those lacking this privilege, to obtain session IDs and impersonate other users by hijacking sessions or generating API tokens. This undermines audit logs and attribution, enabling malicious admins to conceal unauthorized actions. Subsequently, additional DWR endpoints were found vulnerable to information disclosure, including UserAjax.getUsersList.dwr (user enumeration), RoleAjax.getUserRole.dwr, RoleAjax.getRole.dwr, RoleAjax.getRolePermissions.dwr, RoleAjax.isPermissionableInheriting.dwr, RoleAjax.getCurrentCascadePermissionsJobs.dwr (role and permission details), and ThreadMonitorTool.getThreads.dwr (system thread monitoring). Critically, RoleAjax.saveRolePermission.dwr allows privilege escalation by modifying role permissions without proper authorization. The combined vulnerabilities allow attackers with limited admin privileges to escalate access, harvest sensitive user and role information, and evade detection. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L) yields a score of 9.9, reflecting network exploitable, low complexity, requiring low privileges but no user interaction, with a scope change and high impact on confidentiality, integrity, and availability. The vulnerability was responsibly disclosed and fixed in dotCMS versions 24.07.12, 23.01.20 LTS, 23.10.24v13 LTS, and 24.04.24v5 LTS.
Potential Impact
The vulnerability poses a severe risk to organizations using dotCMS core, especially those running affected versions. Attackers with limited administrative privileges can impersonate other users, including high-privilege accounts, leading to unauthorized access to sensitive content and administrative functions. The ability to modify role permissions enables privilege escalation, potentially granting full control over the CMS environment. This can result in data breaches, unauthorized content manipulation, disruption of services, and loss of trust. The obfuscation of attribution complicates incident response and forensic investigations, allowing malicious insiders or compromised admins to evade detection. Given dotCMS's use in enterprise content management, e-commerce, and digital experience platforms, exploitation could impact confidentiality, integrity, and availability of critical business data and services. The network-exploitable nature means attackers can leverage this vulnerability remotely, increasing the attack surface. Organizations face risks including compliance violations, reputational damage, and operational disruption.
Mitigation Recommendations
1. Immediately upgrade dotCMS core to the fixed versions: 24.07.12, 23.01.20 LTS, 23.10.24v13 LTS, or 24.04.24v5 LTS as applicable. 2. Restrict administrative access strictly to trusted personnel and enforce the principle of least privilege, ensuring only necessary admins have elevated rights. 3. Audit and monitor usage of 'Sign In As' and other privileged functions to detect anomalous activity. 4. Disable or restrict access to DWR endpoints if not required, or implement network-level controls such as IP whitelisting and web application firewalls to limit exposure. 5. Implement robust logging and alerting on role permission changes and session management activities to detect potential abuse. 6. Conduct regular reviews of user roles and permissions to identify and remediate excessive privileges. 7. Educate administrators on the risks of session ID exposure and the importance of secure session handling. 8. Consider deploying runtime application self-protection (RASP) or endpoint detection solutions to identify exploitation attempts. 9. Perform penetration testing and vulnerability scanning post-patching to verify remediation and detect any residual issues.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- dotCMS
- Date Reserved
- 2024-05-02T19:24:56.680Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697b39a8ac063202227f4977
Added to database: 1/29/2026, 10:42:48 AM
Last enriched: 2/24/2026, 9:27:49 PM
Last updated: 3/24/2026, 2:52:13 PM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.