Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46097: n/a

0
High
VulnerabilityCVE-2024-46097cvecve-2024-46097
Published: Fri Sep 27 2024 (09/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

TestLink 1.9.20 is vulnerable to Incorrect Access Control in the TestPlan editing section. When a new TestPlan is created, an ID with an incremental value is automatically generated. Using the edit function you can change the tplan_id parameter to another ID. The application does not carry out a check on the user's permissions maing it possible to recover the IDs of all the TestPlans (even the administrative ones) and modify them even with minimal privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:28:49 UTC

Technical Analysis

CVE-2024-46097 is an access control vulnerability identified in TestLink version 1.9.20, a widely used open-source test management tool. The issue arises in the TestPlan editing section, where each TestPlan is assigned an incremental identifier (tplan_id) upon creation. The vulnerability stems from the application's failure to verify user permissions when the tplan_id parameter is manipulated during edit operations. This lack of authorization checks allows users with minimal privileges to enumerate all TestPlan IDs, including those reserved for administrative use, and modify them arbitrarily. The vulnerability is classified under CWE-284 (Improper Access Control). The CVSS v3.1 base score is 8.1, reflecting high severity due to network exploitable attack vector, low attack complexity, and the requirement of only low privileges without user interaction. The impact includes unauthorized disclosure and modification of test plans, which can compromise the integrity of software testing processes and potentially lead to flawed software releases. Although no patches or known exploits are currently documented, the vulnerability presents a significant risk to organizations relying on TestLink for test management. The flaw can be exploited remotely over the network, making it critical to address promptly.

Potential Impact

The vulnerability allows unauthorized users with minimal privileges to access and modify all TestPlans, including those meant for administrators. This compromises the confidentiality of sensitive test data and the integrity of the testing process, potentially leading to incorrect test results and flawed software releases. Organizations relying on TestLink for quality assurance may face operational disruptions and increased risk of software defects reaching production. The ease of exploitation over the network without user interaction increases the likelihood of abuse. Although availability is not directly impacted, the integrity and confidentiality breaches can have cascading effects on software development lifecycles and compliance requirements. The vulnerability could also be leveraged as a foothold for further attacks within an organization's infrastructure if combined with other weaknesses.

Mitigation Recommendations

Since no official patches are currently available, organizations should implement strict access control measures at the application and network layers. This includes restricting TestLink access to trusted users and networks, enforcing strong authentication and role-based access controls, and monitoring for unusual activity related to TestPlan editing. Input validation and parameter tampering detection mechanisms should be employed to detect and block unauthorized manipulation of the tplan_id parameter. Organizations should consider deploying web application firewalls (WAFs) with custom rules to prevent unauthorized access attempts. Regular audits of user permissions and TestPlan modifications can help detect exploitation attempts early. Additionally, organizations should stay alert for updates or patches from the TestLink project and apply them promptly once available. Isolating the TestLink server from public internet exposure can further reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cfab7ef31ef0b56aa2b

Added to database: 2/25/2026, 9:43:22 PM

Last enriched: 2/26/2026, 8:28:49 AM

Last updated: 4/12/2026, 3:38:15 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses