Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48191: n/a

0
Medium
VulnerabilityCVE-2024-48191cvecve-2024-48191
Published: Mon Oct 28 2024 (10/28/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

dingfanzu CMS 1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/doAdminAction.php?act=delAdmin&id=17

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:39:52 UTC

Technical Analysis

CVE-2024-48191 identifies a Cross-Site Request Forgery (CSRF) vulnerability in dingfanzu CMS version 1.0. The vulnerability exists in the administrative endpoint /admin/doAdminAction.php, specifically when processing the 'delAdmin' action parameter. CSRF vulnerabilities allow attackers to induce authenticated users, typically administrators, to unknowingly execute unwanted actions on a web application. In this case, an attacker can craft a malicious request that, when visited or triggered by an authenticated admin, could delete an administrator account without their knowledge or consent. The vulnerability does not require the attacker to have any privileges or prior authentication, but it does require the victim to be logged in and interact with the malicious content (e.g., clicking a link or loading a crafted webpage). The CVSS v3.1 score of 6.3 reflects a medium severity level, considering the attack vector is network-based, with low attack complexity, no privileges required, but requiring user interaction. The impact affects confidentiality, integrity, and availability to a limited extent, as unauthorized deletion of admin accounts can disrupt administrative control and potentially lead to further compromise. Currently, there are no known public exploits or patches available, highlighting the importance of proactive mitigation. The vulnerability is categorized under CWE-352, which covers CSRF issues. Organizations using dingfanzu CMS should audit their systems for exposure and implement protective measures to prevent exploitation.

Potential Impact

The primary impact of CVE-2024-48191 is the unauthorized execution of administrative actions, such as deleting admin accounts, through CSRF attacks. This can lead to loss of administrative control over the CMS, potentially allowing attackers to disrupt website management, degrade service availability, or prepare for further attacks by removing legitimate administrators. The confidentiality of the system may be indirectly affected if administrative accounts are compromised or removed, enabling attackers to escalate privileges or manipulate content. The integrity of the CMS is at risk due to unauthorized modifications to administrative roles. Availability can be impacted if critical admin accounts are deleted, preventing legitimate management and maintenance. Although the attack requires user interaction, the ease of exploitation is relatively low complexity, and the attack can be launched remotely over the network. Organizations relying on dingfanzu CMS for critical web services or content management could face operational disruptions and reputational damage if exploited. The absence of patches and known exploits suggests a window of vulnerability that must be addressed proactively.

Mitigation Recommendations

To mitigate CVE-2024-48191, organizations should implement robust anti-CSRF protections such as synchronizer tokens or double-submit cookies to ensure that administrative actions are only processed when legitimate requests are made by authenticated users. Validate the HTTP Referer and Origin headers to confirm requests originate from trusted sources. Restrict access to the administrative interface by IP whitelisting, VPNs, or multi-factor authentication to reduce exposure. Regularly audit and monitor administrative actions and logs for suspicious activities. Educate administrators about the risks of clicking unknown links or visiting untrusted websites while logged into the CMS. If possible, isolate the CMS admin panel behind additional authentication layers or web application firewalls (WAFs) configured to detect and block CSRF attempts. Stay alert for official patches or updates from dingfanzu CMS developers and apply them promptly once available. Consider implementing Content Security Policy (CSP) headers to reduce the risk of malicious content injection. Finally, conduct penetration testing and vulnerability assessments focused on CSRF and related web application security issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d0db7ef31ef0b56d82c

Added to database: 2/25/2026, 9:43:41 PM

Last enriched: 2/28/2026, 7:39:52 AM

Last updated: 4/12/2026, 5:08:40 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses