CVE-2024-44807: n/a
A directory listing issue in the baserCMS plugin in D-ZERO CO., LTD. BurgerEditor and BurgerEditor Limited Edition before 2.25.1 allows remote attackers to obtain sensitive information by exposing a list of the uploaded files.
AI Analysis
Technical Summary
CVE-2024-44807 is a directory listing vulnerability found in the baserCMS plugin used by BurgerEditor and BurgerEditor Limited Edition products from D-ZERO CO., LTD., affecting versions prior to 2.25.1. This vulnerability arises because the affected software improperly restricts access to directories containing uploaded files, allowing remote attackers to enumerate and view the contents of these directories without any authentication or user interaction. The exposure of uploaded file lists can reveal sensitive information such as configuration files, user data, or other confidential documents that were not intended to be publicly accessible. The vulnerability is categorized under CWE-552, which involves files or directories being accessible to unauthorized external parties. The CVSS v3.1 base score is 5.3, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to confidentiality (C:L) without affecting integrity or availability. Although no exploits have been reported in the wild, the vulnerability presents a risk for information disclosure that could facilitate further targeted attacks or social engineering. The issue was publicly disclosed on October 11, 2024, and no official patches or updates are listed in the provided data, emphasizing the need for users to seek vendor updates or apply mitigations.
Potential Impact
The primary impact of CVE-2024-44807 is unauthorized disclosure of sensitive information due to directory listing of uploaded files. Organizations using affected versions of BurgerEditor or its Limited Edition risk exposure of confidential data, which could include user credentials, internal documents, or system configuration files. This information leakage can aid attackers in reconnaissance, enabling more sophisticated attacks such as privilege escalation, targeted phishing, or exploitation of other vulnerabilities. Although the vulnerability does not directly compromise system integrity or availability, the confidentiality breach can have significant consequences, including reputational damage, regulatory non-compliance, and potential financial losses. Since exploitation requires no authentication or user interaction and can be performed remotely, the attack surface is broad, increasing the likelihood of scanning and exploitation attempts by opportunistic attackers. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks once exploit code becomes available.
Mitigation Recommendations
To mitigate CVE-2024-44807, organizations should first verify if they are running affected versions of BurgerEditor or BurgerEditor Limited Edition prior to 2.25.1. Immediate steps include restricting directory listing permissions on web servers hosting the baserCMS plugin, ensuring that uploaded file directories are not publicly accessible or indexed. Web server configurations (e.g., Apache's Options -Indexes or equivalent in Nginx) should be adjusted to disable directory browsing. Implement access controls such as authentication or IP whitelisting for sensitive directories. If vendor patches or updates become available, apply them promptly to remediate the vulnerability. Additionally, conduct regular security audits and penetration testing to identify similar misconfigurations. Monitoring web server logs for unusual directory access patterns can help detect exploitation attempts early. Educate development and operations teams on secure file upload handling and directory permission best practices to prevent recurrence.
Affected Countries
Japan, United States, Germany, France, South Korea, United Kingdom, Australia, Canada
CVE-2024-44807: n/a
Description
A directory listing issue in the baserCMS plugin in D-ZERO CO., LTD. BurgerEditor and BurgerEditor Limited Edition before 2.25.1 allows remote attackers to obtain sensitive information by exposing a list of the uploaded files.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-44807 is a directory listing vulnerability found in the baserCMS plugin used by BurgerEditor and BurgerEditor Limited Edition products from D-ZERO CO., LTD., affecting versions prior to 2.25.1. This vulnerability arises because the affected software improperly restricts access to directories containing uploaded files, allowing remote attackers to enumerate and view the contents of these directories without any authentication or user interaction. The exposure of uploaded file lists can reveal sensitive information such as configuration files, user data, or other confidential documents that were not intended to be publicly accessible. The vulnerability is categorized under CWE-552, which involves files or directories being accessible to unauthorized external parties. The CVSS v3.1 base score is 5.3, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to confidentiality (C:L) without affecting integrity or availability. Although no exploits have been reported in the wild, the vulnerability presents a risk for information disclosure that could facilitate further targeted attacks or social engineering. The issue was publicly disclosed on October 11, 2024, and no official patches or updates are listed in the provided data, emphasizing the need for users to seek vendor updates or apply mitigations.
Potential Impact
The primary impact of CVE-2024-44807 is unauthorized disclosure of sensitive information due to directory listing of uploaded files. Organizations using affected versions of BurgerEditor or its Limited Edition risk exposure of confidential data, which could include user credentials, internal documents, or system configuration files. This information leakage can aid attackers in reconnaissance, enabling more sophisticated attacks such as privilege escalation, targeted phishing, or exploitation of other vulnerabilities. Although the vulnerability does not directly compromise system integrity or availability, the confidentiality breach can have significant consequences, including reputational damage, regulatory non-compliance, and potential financial losses. Since exploitation requires no authentication or user interaction and can be performed remotely, the attack surface is broad, increasing the likelihood of scanning and exploitation attempts by opportunistic attackers. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks once exploit code becomes available.
Mitigation Recommendations
To mitigate CVE-2024-44807, organizations should first verify if they are running affected versions of BurgerEditor or BurgerEditor Limited Edition prior to 2.25.1. Immediate steps include restricting directory listing permissions on web servers hosting the baserCMS plugin, ensuring that uploaded file directories are not publicly accessible or indexed. Web server configurations (e.g., Apache's Options -Indexes or equivalent in Nginx) should be adjusted to disable directory browsing. Implement access controls such as authentication or IP whitelisting for sensitive directories. If vendor patches or updates become available, apply them promptly to remediate the vulnerability. Additionally, conduct regular security audits and penetration testing to identify similar misconfigurations. Monitoring web server logs for unusual directory access patterns can help detect exploitation attempts early. Educate development and operations teams on secure file upload handling and directory permission best practices to prevent recurrence.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-21T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6ce4b7ef31ef0b569ec6
Added to database: 2/25/2026, 9:43:00 PM
Last enriched: 2/26/2026, 8:03:37 AM
Last updated: 4/12/2026, 6:48:55 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.