CVE-2024-4447: CWE-863 Incorrect Authorization in dotCMS dotCMS core
CVE-2024-4447 is a critical authorization vulnerability in dotCMS core affecting version 4. 2. 1, allowing privileged but non-fully authorized administrators to access session IDs and impersonate other users via exposed Direct Web Remoting (DWR) API endpoints. The flaw enables malicious admins to obfuscate attribution by using session IDs to generate API tokens, bypassing normal audit trails. Additional DWR endpoints were later found vulnerable to information disclosure and privilege escalation, including the ability to enumerate users, roles, permissions, and critically, to modify role permissions. The vulnerability has a CVSS score of 9. 9, reflecting its high impact on confidentiality, integrity, and availability without requiring user interaction. Although exploitation requires some level of privilege, the scope and severity make it a significant threat to organizations using dotCMS. Patches have been released in recent dotCMS versions to address these issues.
AI Analysis
Technical Summary
CVE-2024-4447 is an incorrect authorization vulnerability (CWE-863) in the dotCMS core content management system, specifically affecting version 4.2.1. The vulnerability arises from improper access controls on the System → Maintenance tool’s Logged Users tab, which exposes sessionId data for all users through the Direct Web Remoting (DWR) API endpoint UserSessionAjax.getSessionList.dwr. While session information should only be accessible to administrators with explicit "Sign In As" privileges, this flaw allows any administrator with lesser privileges to retrieve session IDs and impersonate other users by hijacking their sessions. This impersonation bypasses normal logging and attribution mechanisms, enabling malicious admins to perform unauthorized actions without traceability. Further research uncovered additional vulnerable DWR endpoints that leak sensitive information such as user lists, roles, permissions, and system thread information. Critically, the RoleAjax.saveRolePermission.dwr endpoint allows privilege escalation by modifying role permissions, potentially granting attackers full administrative control. The vulnerability is remotely exploitable over the network without user interaction but requires some level of administrative privileges. The CVSS 3.1 base score is 9.9 (critical), reflecting the high confidentiality, integrity, and limited availability impacts, combined with low attack complexity and no user interaction. The vendor has released patches in dotCMS versions 24.07.12, 23.01.20 LTS, 23.10.24v13 LTS, and 24.04.24v5 LTS to remediate these issues. No known exploits in the wild have been reported yet.
Potential Impact
For European organizations using dotCMS core, this vulnerability poses a severe risk to the confidentiality and integrity of their content management systems. Attackers with limited administrative privileges can escalate their access, impersonate other users, and modify role permissions, potentially gaining full control over the CMS environment. This can lead to unauthorized content changes, data leakage of sensitive user and role information, and disruption of services. The ability to obfuscate attribution complicates incident response and forensic investigations, increasing the risk of prolonged undetected compromise. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face heightened compliance risks and potential legal consequences if exploited. The vulnerability's network accessibility and critical severity make it a prime target for insider threats and attackers who have gained partial access, emphasizing the need for immediate remediation to protect European digital assets and maintain trust.
Mitigation Recommendations
European organizations should promptly upgrade dotCMS core to the fixed versions: 24.07.12, 23.01.20 LTS, 23.10.24v13 LTS, or 24.04.24v5 LTS. Until patching is complete, restrict administrative access to the CMS to only fully trusted personnel and enforce strict role-based access controls to minimize the number of users with elevated privileges. Monitor and audit all administrative actions closely, focusing on unusual session activity or role permission changes. Disable or restrict access to the vulnerable DWR API endpoints if possible, using web application firewalls or API gateways to block unauthorized calls. Implement multi-factor authentication for all admin accounts to reduce the risk of credential compromise. Regularly review and update user roles and permissions to ensure least privilege principles are enforced. Finally, maintain comprehensive logging and ensure logs are protected from tampering to aid in detection and forensic analysis.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2024-4447: CWE-863 Incorrect Authorization in dotCMS dotCMS core
Description
CVE-2024-4447 is a critical authorization vulnerability in dotCMS core affecting version 4. 2. 1, allowing privileged but non-fully authorized administrators to access session IDs and impersonate other users via exposed Direct Web Remoting (DWR) API endpoints. The flaw enables malicious admins to obfuscate attribution by using session IDs to generate API tokens, bypassing normal audit trails. Additional DWR endpoints were later found vulnerable to information disclosure and privilege escalation, including the ability to enumerate users, roles, permissions, and critically, to modify role permissions. The vulnerability has a CVSS score of 9. 9, reflecting its high impact on confidentiality, integrity, and availability without requiring user interaction. Although exploitation requires some level of privilege, the scope and severity make it a significant threat to organizations using dotCMS. Patches have been released in recent dotCMS versions to address these issues.
AI-Powered Analysis
Technical Analysis
CVE-2024-4447 is an incorrect authorization vulnerability (CWE-863) in the dotCMS core content management system, specifically affecting version 4.2.1. The vulnerability arises from improper access controls on the System → Maintenance tool’s Logged Users tab, which exposes sessionId data for all users through the Direct Web Remoting (DWR) API endpoint UserSessionAjax.getSessionList.dwr. While session information should only be accessible to administrators with explicit "Sign In As" privileges, this flaw allows any administrator with lesser privileges to retrieve session IDs and impersonate other users by hijacking their sessions. This impersonation bypasses normal logging and attribution mechanisms, enabling malicious admins to perform unauthorized actions without traceability. Further research uncovered additional vulnerable DWR endpoints that leak sensitive information such as user lists, roles, permissions, and system thread information. Critically, the RoleAjax.saveRolePermission.dwr endpoint allows privilege escalation by modifying role permissions, potentially granting attackers full administrative control. The vulnerability is remotely exploitable over the network without user interaction but requires some level of administrative privileges. The CVSS 3.1 base score is 9.9 (critical), reflecting the high confidentiality, integrity, and limited availability impacts, combined with low attack complexity and no user interaction. The vendor has released patches in dotCMS versions 24.07.12, 23.01.20 LTS, 23.10.24v13 LTS, and 24.04.24v5 LTS to remediate these issues. No known exploits in the wild have been reported yet.
Potential Impact
For European organizations using dotCMS core, this vulnerability poses a severe risk to the confidentiality and integrity of their content management systems. Attackers with limited administrative privileges can escalate their access, impersonate other users, and modify role permissions, potentially gaining full control over the CMS environment. This can lead to unauthorized content changes, data leakage of sensitive user and role information, and disruption of services. The ability to obfuscate attribution complicates incident response and forensic investigations, increasing the risk of prolonged undetected compromise. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face heightened compliance risks and potential legal consequences if exploited. The vulnerability's network accessibility and critical severity make it a prime target for insider threats and attackers who have gained partial access, emphasizing the need for immediate remediation to protect European digital assets and maintain trust.
Mitigation Recommendations
European organizations should promptly upgrade dotCMS core to the fixed versions: 24.07.12, 23.01.20 LTS, 23.10.24v13 LTS, or 24.04.24v5 LTS. Until patching is complete, restrict administrative access to the CMS to only fully trusted personnel and enforce strict role-based access controls to minimize the number of users with elevated privileges. Monitor and audit all administrative actions closely, focusing on unusual session activity or role permission changes. Disable or restrict access to the vulnerable DWR API endpoints if possible, using web application firewalls or API gateways to block unauthorized calls. Implement multi-factor authentication for all admin accounts to reduce the risk of credential compromise. Regularly review and update user roles and permissions to ensure least privilege principles are enforced. Finally, maintain comprehensive logging and ensure logs are protected from tampering to aid in detection and forensic analysis.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- dotCMS
- Date Reserved
- 2024-05-02T19:24:56.680Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697b39a8ac063202227f4977
Added to database: 1/29/2026, 10:42:48 AM
Last enriched: 1/29/2026, 10:57:09 AM
Last updated: 1/29/2026, 2:04:18 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1588: Path Traversal in jishenghua jshERP
MediumCVE-2026-1469: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in RLE NOVA PlanManager
MediumCVE-2025-7015: CWE-384 Session Fixation in Akın Software Computer Import Export Industry and Trade Ltd. QR Menu
MediumCVE-2025-7016: CWE-284 Improper Access Control in Akın Software Computer Import Export Industry and Trade Ltd. QR Menu
HighCVE-2026-22764: CWE-287: Improper Authentication in Dell OpenManage Network Integration
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.