CVE-2024-4447: CWE-863 Incorrect Authorization in dotCMS dotCMS core
In the System → Maintenance tool, the Logged Users tab surfaces sessionId data for all users via the Direct Web Remoting API (UserSessionAjax.getSessionList.dwr) calls. While this is information that would and should be available to admins who possess "Sign In As" powers, admins who otherwise lack this privilege would still be able to utilize the session IDs to imitate other users. While this is a very small attack vector that requires very high permissions to execute, its danger lies principally in obfuscating attribution; all Sign In As operations are attributed appropriately in the log files, and a malicious administrator could use this information to render their dealings untraceable — including those admins who have not been granted this ability — such as by using a session ID to generate an API token. Fixed in: 24.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS This was the original found by researcher Zakaria Agharghar. 2. Later, on October 20, 2025, another researcher (Chris O’Neill) found additional affected DWR Endpoints that are vulnerable to Information Disclosure, namely and in addition to the original found of "UserSessionAjax.getSessionList.dwr - Session ID exposure": * UserAjax.getUsersList.dwr - Enumerate all users with IDs, names, emails * RoleAjax.getUserRole.dwr - Get user role information * RoleAjax.getRole.dwr - Get role details * RoleAjax.getRolePermissions.dwr - View role permissions * RoleAjax.isPermissionableInheriting.dwr - Check permission inheritance * RoleAjax.getCurrentCascadePermissionsJobs.dwr - View permission cascade jobs * ThreadMonitorTool.getThreads.dwr - Monitor system threads; and, * CRITICAL - Privilege Escalation: RoleAjax.saveRolePermission.dwr - Modify role permissions Overall CVSS for the above findings: * CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L * Score: 9.1 (Critical)
AI Analysis
Technical Summary
CVE-2024-4447 is an incorrect authorization vulnerability (CWE-863) in the dotCMS core content management system, specifically affecting version 4.2.1. The vulnerability arises from improper access controls on the System → Maintenance tool’s Logged Users tab, which exposes sessionId data for all users through the Direct Web Remoting (DWR) API endpoint UserSessionAjax.getSessionList.dwr. While session information should only be accessible to administrators with explicit "Sign In As" privileges, this flaw allows any administrator with lesser privileges to retrieve session IDs and impersonate other users by hijacking their sessions. This impersonation bypasses normal logging and attribution mechanisms, enabling malicious admins to perform unauthorized actions without traceability. Further research uncovered additional vulnerable DWR endpoints that leak sensitive information such as user lists, roles, permissions, and system thread information. Critically, the RoleAjax.saveRolePermission.dwr endpoint allows privilege escalation by modifying role permissions, potentially granting attackers full administrative control. The vulnerability is remotely exploitable over the network without user interaction but requires some level of administrative privileges. The CVSS 3.1 base score is 9.9 (critical), reflecting the high confidentiality, integrity, and limited availability impacts, combined with low attack complexity and no user interaction. The vendor has released patches in dotCMS versions 24.07.12, 23.01.20 LTS, 23.10.24v13 LTS, and 24.04.24v5 LTS to remediate these issues. No known exploits in the wild have been reported yet.
Potential Impact
For European organizations using dotCMS core, this vulnerability poses a severe risk to the confidentiality and integrity of their content management systems. Attackers with limited administrative privileges can escalate their access, impersonate other users, and modify role permissions, potentially gaining full control over the CMS environment. This can lead to unauthorized content changes, data leakage of sensitive user and role information, and disruption of services. The ability to obfuscate attribution complicates incident response and forensic investigations, increasing the risk of prolonged undetected compromise. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face heightened compliance risks and potential legal consequences if exploited. The vulnerability's network accessibility and critical severity make it a prime target for insider threats and attackers who have gained partial access, emphasizing the need for immediate remediation to protect European digital assets and maintain trust.
Mitigation Recommendations
European organizations should promptly upgrade dotCMS core to the fixed versions: 24.07.12, 23.01.20 LTS, 23.10.24v13 LTS, or 24.04.24v5 LTS. Until patching is complete, restrict administrative access to the CMS to only fully trusted personnel and enforce strict role-based access controls to minimize the number of users with elevated privileges. Monitor and audit all administrative actions closely, focusing on unusual session activity or role permission changes. Disable or restrict access to the vulnerable DWR API endpoints if possible, using web application firewalls or API gateways to block unauthorized calls. Implement multi-factor authentication for all admin accounts to reduce the risk of credential compromise. Regularly review and update user roles and permissions to ensure least privilege principles are enforced. Finally, maintain comprehensive logging and ensure logs are protected from tampering to aid in detection and forensic analysis.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2024-4447: CWE-863 Incorrect Authorization in dotCMS dotCMS core
Description
In the System → Maintenance tool, the Logged Users tab surfaces sessionId data for all users via the Direct Web Remoting API (UserSessionAjax.getSessionList.dwr) calls. While this is information that would and should be available to admins who possess "Sign In As" powers, admins who otherwise lack this privilege would still be able to utilize the session IDs to imitate other users. While this is a very small attack vector that requires very high permissions to execute, its danger lies principally in obfuscating attribution; all Sign In As operations are attributed appropriately in the log files, and a malicious administrator could use this information to render their dealings untraceable — including those admins who have not been granted this ability — such as by using a session ID to generate an API token. Fixed in: 24.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS This was the original found by researcher Zakaria Agharghar. 2. Later, on October 20, 2025, another researcher (Chris O’Neill) found additional affected DWR Endpoints that are vulnerable to Information Disclosure, namely and in addition to the original found of "UserSessionAjax.getSessionList.dwr - Session ID exposure": * UserAjax.getUsersList.dwr - Enumerate all users with IDs, names, emails * RoleAjax.getUserRole.dwr - Get user role information * RoleAjax.getRole.dwr - Get role details * RoleAjax.getRolePermissions.dwr - View role permissions * RoleAjax.isPermissionableInheriting.dwr - Check permission inheritance * RoleAjax.getCurrentCascadePermissionsJobs.dwr - View permission cascade jobs * ThreadMonitorTool.getThreads.dwr - Monitor system threads; and, * CRITICAL - Privilege Escalation: RoleAjax.saveRolePermission.dwr - Modify role permissions Overall CVSS for the above findings: * CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L * Score: 9.1 (Critical)
AI-Powered Analysis
Technical Analysis
CVE-2024-4447 is an incorrect authorization vulnerability (CWE-863) in the dotCMS core content management system, specifically affecting version 4.2.1. The vulnerability arises from improper access controls on the System → Maintenance tool’s Logged Users tab, which exposes sessionId data for all users through the Direct Web Remoting (DWR) API endpoint UserSessionAjax.getSessionList.dwr. While session information should only be accessible to administrators with explicit "Sign In As" privileges, this flaw allows any administrator with lesser privileges to retrieve session IDs and impersonate other users by hijacking their sessions. This impersonation bypasses normal logging and attribution mechanisms, enabling malicious admins to perform unauthorized actions without traceability. Further research uncovered additional vulnerable DWR endpoints that leak sensitive information such as user lists, roles, permissions, and system thread information. Critically, the RoleAjax.saveRolePermission.dwr endpoint allows privilege escalation by modifying role permissions, potentially granting attackers full administrative control. The vulnerability is remotely exploitable over the network without user interaction but requires some level of administrative privileges. The CVSS 3.1 base score is 9.9 (critical), reflecting the high confidentiality, integrity, and limited availability impacts, combined with low attack complexity and no user interaction. The vendor has released patches in dotCMS versions 24.07.12, 23.01.20 LTS, 23.10.24v13 LTS, and 24.04.24v5 LTS to remediate these issues. No known exploits in the wild have been reported yet.
Potential Impact
For European organizations using dotCMS core, this vulnerability poses a severe risk to the confidentiality and integrity of their content management systems. Attackers with limited administrative privileges can escalate their access, impersonate other users, and modify role permissions, potentially gaining full control over the CMS environment. This can lead to unauthorized content changes, data leakage of sensitive user and role information, and disruption of services. The ability to obfuscate attribution complicates incident response and forensic investigations, increasing the risk of prolonged undetected compromise. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face heightened compliance risks and potential legal consequences if exploited. The vulnerability's network accessibility and critical severity make it a prime target for insider threats and attackers who have gained partial access, emphasizing the need for immediate remediation to protect European digital assets and maintain trust.
Mitigation Recommendations
European organizations should promptly upgrade dotCMS core to the fixed versions: 24.07.12, 23.01.20 LTS, 23.10.24v13 LTS, or 24.04.24v5 LTS. Until patching is complete, restrict administrative access to the CMS to only fully trusted personnel and enforce strict role-based access controls to minimize the number of users with elevated privileges. Monitor and audit all administrative actions closely, focusing on unusual session activity or role permission changes. Disable or restrict access to the vulnerable DWR API endpoints if possible, using web application firewalls or API gateways to block unauthorized calls. Implement multi-factor authentication for all admin accounts to reduce the risk of credential compromise. Regularly review and update user roles and permissions to ensure least privilege principles are enforced. Finally, maintain comprehensive logging and ensure logs are protected from tampering to aid in detection and forensic analysis.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- dotCMS
- Date Reserved
- 2024-05-02T19:24:56.680Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697b39a8ac063202227f4977
Added to database: 1/29/2026, 10:42:48 AM
Last enriched: 1/29/2026, 10:57:09 AM
Last updated: 2/6/2026, 5:30:42 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2059: SQL Injection in SourceCodester Medical Center Portal Management System
MediumCVE-2025-13523: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Mattermost Mattermost Confluence Plugin
HighCVE-2026-2103: CWE-321 in Infor SyteLine ERP
HighCVE-2026-2058: SQL Injection in mathurvishal CloudClassroom-PHP-Project
MediumCVE-2026-25556: CWE-415 Double Free in Artifex Software MuPDF
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.