CVE-2024-49335: Cross-Site Request Forgery (CSRF) in sh4d0w28 GoogleDrive folder list
Cross-Site Request Forgery (CSRF) vulnerability in sh4d0w28 GoogleDrive folder list googledrive-folder-list allows Stored XSS.This issue affects GoogleDrive folder list: from n/a through <= 2.2.2.
AI Analysis
Technical Summary
CVE-2024-49335 is a security vulnerability identified in the sh4d0w28 GoogleDrive folder list plugin, specifically affecting versions up to and including 2.2.2. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that allows attackers to trick authenticated users into submitting unwanted requests to the web application. This CSRF vulnerability is compounded by the presence of Stored Cross-Site Scripting (XSS), where malicious scripts injected by the attacker are stored on the server and later executed in the context of users' browsers. The combination of CSRF and Stored XSS means that an attacker can craft a malicious webpage or link that, when visited by an authenticated user, causes the victim's browser to perform unauthorized actions and execute attacker-controlled scripts. These scripts can steal session cookies, manipulate user data, or perform actions with the victim's privileges. The vulnerability affects the GoogleDrive folder list plugin, a tool used to display Google Drive folders within web applications, which is popular among websites integrating Google Drive content. No CVSS score has been assigned yet, and no public exploits have been reported. The vulnerability was published on October 20, 2024, and was reserved on October 14, 2024, by Patchstack. The lack of a patch link suggests that a fix may not yet be available, increasing the urgency for mitigation. Exploitation requires the victim to be authenticated and to interact with a malicious site, but the impact on confidentiality, integrity, and availability can be severe due to the Stored XSS component.
Potential Impact
The impact of CVE-2024-49335 is significant for organizations using the affected GoogleDrive folder list plugin. Successful exploitation can lead to unauthorized actions performed on behalf of authenticated users, including data manipulation or leakage. The Stored XSS aspect allows attackers to execute persistent malicious scripts, potentially leading to session hijacking, credential theft, or further compromise of user accounts. This can undermine user trust, lead to data breaches, and facilitate lateral movement within an organization's network. The vulnerability could also be leveraged to spread malware or conduct phishing attacks by injecting malicious content into trusted web pages. Since the plugin is used to integrate Google Drive content, sensitive business or personal data exposed through these folders could be at risk. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability's nature makes it a high-risk target for attackers once exploit code becomes available. Organizations with high-value data or large user bases are particularly at risk, as the exploitation could affect multiple users simultaneously.
Mitigation Recommendations
To mitigate CVE-2024-49335, organizations should first check if an official patch or update is available from the plugin vendor and apply it immediately. If no patch is available, consider disabling or removing the GoogleDrive folder list plugin until a fix is released. Implementing anti-CSRF tokens in all state-changing requests can prevent unauthorized request forgery. Web application firewalls (WAFs) can be configured to detect and block suspicious CSRF and XSS attack patterns targeting the plugin endpoints. Conduct a thorough review of input validation and output encoding mechanisms within the plugin to prevent Stored XSS. Educate users about the risks of clicking on suspicious links and visiting untrusted websites, as user interaction is required for exploitation. Regularly audit and monitor web application logs for unusual activities that may indicate exploitation attempts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Finally, maintain a robust incident response plan to quickly address any signs of compromise related to this vulnerability.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Japan, South Korea
CVE-2024-49335: Cross-Site Request Forgery (CSRF) in sh4d0w28 GoogleDrive folder list
Description
Cross-Site Request Forgery (CSRF) vulnerability in sh4d0w28 GoogleDrive folder list googledrive-folder-list allows Stored XSS.This issue affects GoogleDrive folder list: from n/a through <= 2.2.2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-49335 is a security vulnerability identified in the sh4d0w28 GoogleDrive folder list plugin, specifically affecting versions up to and including 2.2.2. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that allows attackers to trick authenticated users into submitting unwanted requests to the web application. This CSRF vulnerability is compounded by the presence of Stored Cross-Site Scripting (XSS), where malicious scripts injected by the attacker are stored on the server and later executed in the context of users' browsers. The combination of CSRF and Stored XSS means that an attacker can craft a malicious webpage or link that, when visited by an authenticated user, causes the victim's browser to perform unauthorized actions and execute attacker-controlled scripts. These scripts can steal session cookies, manipulate user data, or perform actions with the victim's privileges. The vulnerability affects the GoogleDrive folder list plugin, a tool used to display Google Drive folders within web applications, which is popular among websites integrating Google Drive content. No CVSS score has been assigned yet, and no public exploits have been reported. The vulnerability was published on October 20, 2024, and was reserved on October 14, 2024, by Patchstack. The lack of a patch link suggests that a fix may not yet be available, increasing the urgency for mitigation. Exploitation requires the victim to be authenticated and to interact with a malicious site, but the impact on confidentiality, integrity, and availability can be severe due to the Stored XSS component.
Potential Impact
The impact of CVE-2024-49335 is significant for organizations using the affected GoogleDrive folder list plugin. Successful exploitation can lead to unauthorized actions performed on behalf of authenticated users, including data manipulation or leakage. The Stored XSS aspect allows attackers to execute persistent malicious scripts, potentially leading to session hijacking, credential theft, or further compromise of user accounts. This can undermine user trust, lead to data breaches, and facilitate lateral movement within an organization's network. The vulnerability could also be leveraged to spread malware or conduct phishing attacks by injecting malicious content into trusted web pages. Since the plugin is used to integrate Google Drive content, sensitive business or personal data exposed through these folders could be at risk. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability's nature makes it a high-risk target for attackers once exploit code becomes available. Organizations with high-value data or large user bases are particularly at risk, as the exploitation could affect multiple users simultaneously.
Mitigation Recommendations
To mitigate CVE-2024-49335, organizations should first check if an official patch or update is available from the plugin vendor and apply it immediately. If no patch is available, consider disabling or removing the GoogleDrive folder list plugin until a fix is released. Implementing anti-CSRF tokens in all state-changing requests can prevent unauthorized request forgery. Web application firewalls (WAFs) can be configured to detect and block suspicious CSRF and XSS attack patterns targeting the plugin endpoints. Conduct a thorough review of input validation and output encoding mechanisms within the plugin to prevent Stored XSS. Educate users about the risks of clicking on suspicious links and visiting untrusted websites, as user interaction is required for exploitation. Regularly audit and monitor web application logs for unusual activities that may indicate exploitation attempts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Finally, maintain a robust incident response plan to quickly address any signs of compromise related to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2024-10-14T10:40:38.485Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69cd74d2e6bfc5ba1df01183
Added to database: 4/1/2026, 7:41:06 PM
Last enriched: 4/2/2026, 7:05:50 AM
Last updated: 4/6/2026, 9:20:48 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.