Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46373: n/a

0
High
VulnerabilityCVE-2024-46373cvecve-2024-46373
Published: Wed Sep 18 2024 (09/18/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Dedecms V5.7.115 contains an arbitrary code execution via file upload vulnerability in the backend.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:20:49 UTC

Technical Analysis

CVE-2024-46373 is a critical security vulnerability identified in Dedecms version 5.7.115, a popular content management system. The flaw lies in the backend file upload functionality, where insufficient validation allows attackers to upload malicious files that can be executed on the server, leading to arbitrary code execution. This vulnerability is categorized under CWE-434, which pertains to improper restriction of file uploads, a common vector for remote code execution attacks. The CVSS 3.1 base score of 8.8 indicates a high-severity issue with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Exploiting this vulnerability could allow an unauthenticated attacker to execute arbitrary commands on the server hosting Dedecms, potentially leading to full system compromise, data theft, defacement, or further lateral movement within the network. Although no public exploits have been reported yet, the nature of the vulnerability and the widespread use of Dedecms in certain regions make it a significant threat. No patches or official remediation guidance have been published at this time, increasing the urgency for organizations to implement interim protective measures.

Potential Impact

The impact of CVE-2024-46373 is severe for organizations using Dedecms 5.7.115. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary code remotely without authentication. This can result in data breaches, unauthorized data modification, website defacement, service disruption, and potential pivoting to internal networks. The confidentiality, integrity, and availability of affected systems are all at high risk. Organizations hosting sensitive or critical data on Dedecms platforms face increased risk of reputational damage, regulatory penalties, and operational downtime. The vulnerability's ease of exploitation and lack of required privileges amplify its threat level, making it attractive for attackers once exploit code becomes available. The absence of patches means organizations must rely on mitigations to reduce exposure until an official fix is released.

Mitigation Recommendations

1. Immediately restrict access to the Dedecms backend interface to trusted IP addresses or VPN users only, minimizing exposure to potential attackers. 2. Implement strict file upload validation and filtering at the web server or application firewall level to block executable file types and suspicious payloads. 3. Monitor server logs and file upload directories for unusual or unauthorized file uploads and promptly investigate anomalies. 4. Disable or limit file upload functionality in the backend if not essential for operations. 5. Employ web application firewalls (WAFs) with custom rules to detect and block malicious upload attempts targeting Dedecms. 6. Prepare for rapid patch deployment by tracking vendor advisories and subscribing to security bulletins related to Dedecms. 7. Conduct regular security audits and penetration tests focusing on file upload mechanisms. 8. Educate administrators and backend users about the risks of uploading untrusted files and enforce strong authentication and session management controls. 9. Consider isolating Dedecms instances in segmented network zones to limit lateral movement in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cfcb7ef31ef0b56aba2

Added to database: 2/25/2026, 9:43:24 PM

Last enriched: 2/28/2026, 7:20:49 AM

Last updated: 4/12/2026, 6:10:35 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses