Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45186: n/a

0
Critical
VulnerabilityCVE-2024-45186cvecve-2024-45186
Published: Wed Oct 02 2024 (10/02/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

FileSender before 2.49 allows server-side template injection (SSTI) for retrieving credentials.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:54:45 UTC

Technical Analysis

CVE-2024-45186 is a critical security vulnerability identified in FileSender, an open-source file transfer application commonly used by academic institutions and organizations for secure large file sharing. The vulnerability exists in versions prior to 2.49 and is classified as a server-side template injection (SSTI) issue, categorized under CWE-94 (Improper Control of Generation of Code). SSTI vulnerabilities occur when user-supplied input is unsafely embedded into server-side templates, allowing attackers to inject and execute arbitrary code on the server. In this case, the flaw enables remote, unauthenticated attackers to craft malicious requests that exploit the template engine to execute arbitrary commands or retrieve sensitive credentials stored on the server. The CVSS 3.1 base score of 9.8 indicates critical severity, with attack vector being network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). This means exploitation is straightforward and can lead to full system compromise. Although no public exploits have been reported yet, the vulnerability's nature and impact make it a high priority for remediation. The absence of patch links suggests that a fixed version or official patch may be pending or newly released, emphasizing the need for vigilance and immediate action by administrators. The vulnerability's exploitation could lead to unauthorized data access, system takeover, and disruption of services.

Potential Impact

The impact of CVE-2024-45186 is severe for organizations worldwide using vulnerable versions of FileSender. Successful exploitation can lead to complete compromise of the affected server, including unauthorized access to sensitive credentials and data, modification or deletion of files, and disruption of file transfer services. This can result in data breaches, loss of intellectual property, and operational downtime. Given FileSender's use in academic, research, and enterprise environments, attackers could leverage this vulnerability to infiltrate broader networks, escalate privileges, and move laterally within organizations. The critical nature of the vulnerability means that even organizations with strong perimeter defenses are at risk if they expose FileSender instances to the internet. The lack of required authentication and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation once the vulnerability becomes widely known or weaponized.

Mitigation Recommendations

To mitigate CVE-2024-45186, organizations should immediately upgrade FileSender to version 2.49 or later once available, as this will contain the necessary patches to fix the SSTI vulnerability. Until an official patch is applied, administrators should restrict access to FileSender instances by implementing network-level controls such as IP whitelisting, VPN-only access, or firewall rules to limit exposure. Additionally, input validation and sanitization should be enforced on all user-supplied data that interacts with template engines to prevent injection of malicious code. Employing template sandboxing or switching to safer templating engines can reduce the risk of SSTI. Monitoring logs for unusual template processing errors or suspicious requests can help detect attempted exploitation. Regularly auditing and rotating credentials stored on the server will limit damage if credentials are compromised. Finally, organizations should maintain an incident response plan to quickly address any signs of compromise related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ceab7ef31ef0b56a2b5

Added to database: 2/25/2026, 9:43:06 PM

Last enriched: 2/28/2026, 6:54:45 AM

Last updated: 4/12/2026, 6:13:24 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses