Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46394: n/a

0
High
VulnerabilityCVE-2024-46394cvecve-2024-46394
Published: Thu Sep 19 2024 (09/19/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

FrogCMS v0.9.5 was discovered to contain a Cross-Site Request Forgery (CSRF) via /admin/?/user/add

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:35:56 UTC

Technical Analysis

CVE-2024-46394 identifies a Cross-Site Request Forgery (CSRF) vulnerability in FrogCMS version 0.9.5, specifically targeting the /admin/?/user/add administrative endpoint. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted requests to a web application, thereby executing actions without the user's consent. In this case, the vulnerability enables an attacker to potentially add new users or manipulate user-related functions within the CMS. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) indicates that the attack can be performed remotely over the network with low attack complexity, requiring low privileges and user interaction, and affects confidentiality, integrity, and availability at a high level. The vulnerability stems from the absence or improper implementation of anti-CSRF protections, such as missing or ineffective CSRF tokens in the user addition workflow. While no patches or exploits are currently documented, the flaw represents a critical risk for administrators who may be tricked into executing malicious requests, potentially leading to unauthorized account creation, privilege escalation, or disruption of CMS operations. This vulnerability is categorized under CWE-352, which covers CSRF weaknesses. Organizations using FrogCMS 0.9.5 should prioritize remediation to prevent exploitation.

Potential Impact

The impact of CVE-2024-46394 is significant for organizations relying on FrogCMS for content management. Successful exploitation can lead to unauthorized user creation or modification, enabling attackers to escalate privileges or gain persistent access to administrative functions. This compromises the confidentiality of sensitive data managed within the CMS, the integrity of website content and user accounts, and the availability of the CMS through potential disruption or misuse of administrative capabilities. Given the low complexity and remote exploitability, attackers can leverage social engineering to induce authenticated administrators to perform malicious actions unknowingly. This can result in defacement, data breaches, or complete takeover of the CMS environment. Organizations with public-facing FrogCMS installations are particularly vulnerable, potentially affecting their reputation and operational continuity.

Mitigation Recommendations

To mitigate CVE-2024-46394, organizations should implement robust anti-CSRF protections in FrogCMS, especially on sensitive administrative endpoints like /admin/?/user/add. This includes integrating unique, unpredictable CSRF tokens in all state-changing requests and validating these tokens server-side before processing. Additionally, enforcing strict user session management and limiting administrative access to trusted networks or VPNs can reduce exposure. Administrators should be trained to recognize phishing and social engineering attempts that could trigger CSRF attacks. Monitoring and logging administrative actions can help detect suspicious activities early. If possible, upgrading to a patched version of FrogCMS or applying vendor-provided fixes is recommended once available. As a temporary measure, disabling or restricting access to vulnerable endpoints until a fix is deployed can reduce risk. Employing web application firewalls (WAFs) with CSRF detection rules may also provide an additional layer of defense.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cfeb7ef31ef0b56ac06

Added to database: 2/25/2026, 9:43:26 PM

Last enriched: 2/26/2026, 8:35:56 AM

Last updated: 4/12/2026, 3:42:22 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses