Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4447: CWE-863 Incorrect Authorization in dotCMS dotCMS core

0
Critical
VulnerabilityCVE-2024-4447cvecve-2024-4447cwe-863
Published: Fri Jul 26 2024 (07/26/2024, 02:02:32 UTC)
Source: CVE Database V5
Vendor/Project: dotCMS
Product: dotCMS core

Description

In the System → Maintenance tool, the Logged Users tab surfaces sessionId data for all users via the Direct Web Remoting API (UserSessionAjax.getSessionList.dwr) calls. While this is information that would and should be available to admins who possess "Sign In As" powers, admins who otherwise lack this privilege would still be able to utilize the session IDs to imitate other users. While this is a very small attack vector that requires very high permissions to execute, its danger lies principally in obfuscating attribution; all Sign In As operations are attributed appropriately in the log files, and a malicious administrator could use this information to render their dealings untraceable — including those admins who have not been granted this ability — such as by using a session ID to generate an API token. Fixed in: 24.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS This was the original found by researcher Zakaria Agharghar. 2. Later, on October 20, 2025, another researcher (Chris O’Neill) found additional affected DWR Endpoints that are vulnerable to Information Disclosure, namely and in addition to the original found of "UserSessionAjax.getSessionList.dwr - Session ID exposure": * UserAjax.getUsersList.dwr - Enumerate all users with IDs, names, emails * RoleAjax.getUserRole.dwr - Get user role information * RoleAjax.getRole.dwr - Get role details * RoleAjax.getRolePermissions.dwr - View role permissions * RoleAjax.isPermissionableInheriting.dwr - Check permission inheritance * RoleAjax.getCurrentCascadePermissionsJobs.dwr - View permission cascade jobs * ThreadMonitorTool.getThreads.dwr - Monitor system threads; and, * CRITICAL - Privilege Escalation: RoleAjax.saveRolePermission.dwr - Modify role permissions Overall CVSS for the above findings: * CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L * Score: 9.1 (Critical)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 21:27:49 UTC

Technical Analysis

CVE-2024-4447 identifies a critical incorrect authorization vulnerability (CWE-863) in dotCMS core, specifically affecting version 4.2.1 and certain LTS versions. The initial issue involves the System → Maintenance tool's Logged Users tab exposing sessionId data for all users through the Direct Web Remoting (DWR) API endpoint UserSessionAjax.getSessionList.dwr. While session information should be restricted to administrators with 'Sign In As' privileges, the flaw allows any admin, even those lacking this privilege, to obtain session IDs and impersonate other users by hijacking sessions or generating API tokens. This undermines audit logs and attribution, enabling malicious admins to conceal unauthorized actions. Subsequently, additional DWR endpoints were found vulnerable to information disclosure, including UserAjax.getUsersList.dwr (user enumeration), RoleAjax.getUserRole.dwr, RoleAjax.getRole.dwr, RoleAjax.getRolePermissions.dwr, RoleAjax.isPermissionableInheriting.dwr, RoleAjax.getCurrentCascadePermissionsJobs.dwr (role and permission details), and ThreadMonitorTool.getThreads.dwr (system thread monitoring). Critically, RoleAjax.saveRolePermission.dwr allows privilege escalation by modifying role permissions without proper authorization. The combined vulnerabilities allow attackers with limited admin privileges to escalate access, harvest sensitive user and role information, and evade detection. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L) yields a score of 9.9, reflecting network exploitable, low complexity, requiring low privileges but no user interaction, with a scope change and high impact on confidentiality, integrity, and availability. The vulnerability was responsibly disclosed and fixed in dotCMS versions 24.07.12, 23.01.20 LTS, 23.10.24v13 LTS, and 24.04.24v5 LTS.

Potential Impact

The vulnerability poses a severe risk to organizations using dotCMS core, especially those running affected versions. Attackers with limited administrative privileges can impersonate other users, including high-privilege accounts, leading to unauthorized access to sensitive content and administrative functions. The ability to modify role permissions enables privilege escalation, potentially granting full control over the CMS environment. This can result in data breaches, unauthorized content manipulation, disruption of services, and loss of trust. The obfuscation of attribution complicates incident response and forensic investigations, allowing malicious insiders or compromised admins to evade detection. Given dotCMS's use in enterprise content management, e-commerce, and digital experience platforms, exploitation could impact confidentiality, integrity, and availability of critical business data and services. The network-exploitable nature means attackers can leverage this vulnerability remotely, increasing the attack surface. Organizations face risks including compliance violations, reputational damage, and operational disruption.

Mitigation Recommendations

1. Immediately upgrade dotCMS core to the fixed versions: 24.07.12, 23.01.20 LTS, 23.10.24v13 LTS, or 24.04.24v5 LTS as applicable. 2. Restrict administrative access strictly to trusted personnel and enforce the principle of least privilege, ensuring only necessary admins have elevated rights. 3. Audit and monitor usage of 'Sign In As' and other privileged functions to detect anomalous activity. 4. Disable or restrict access to DWR endpoints if not required, or implement network-level controls such as IP whitelisting and web application firewalls to limit exposure. 5. Implement robust logging and alerting on role permission changes and session management activities to detect potential abuse. 6. Conduct regular reviews of user roles and permissions to identify and remediate excessive privileges. 7. Educate administrators on the risks of session ID exposure and the importance of secure session handling. 8. Consider deploying runtime application self-protection (RASP) or endpoint detection solutions to identify exploitation attempts. 9. Perform penetration testing and vulnerability scanning post-patching to verify remediation and detect any residual issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
dotCMS
Date Reserved
2024-05-02T19:24:56.680Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697b39a8ac063202227f4977

Added to database: 1/29/2026, 10:42:48 AM

Last enriched: 2/24/2026, 9:27:49 PM

Last updated: 3/24/2026, 2:52:13 PM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses