Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-49335: Cross-Site Request Forgery (CSRF) in sh4d0w28 GoogleDrive folder list

0
Unknown
VulnerabilityCVE-2024-49335cvecve-2024-49335
Published: Sun Oct 20 2024 (10/20/2024, 10:08:20 UTC)
Source: CVE Database V5
Vendor/Project: sh4d0w28
Product: GoogleDrive folder list

Description

Cross-Site Request Forgery (CSRF) vulnerability in sh4d0w28 GoogleDrive folder list googledrive-folder-list allows Stored XSS.This issue affects GoogleDrive folder list: from n/a through <= 2.2.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 07:05:50 UTC

Technical Analysis

CVE-2024-49335 is a security vulnerability identified in the sh4d0w28 GoogleDrive folder list plugin, specifically affecting versions up to and including 2.2.2. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that allows attackers to trick authenticated users into submitting unwanted requests to the web application. This CSRF vulnerability is compounded by the presence of Stored Cross-Site Scripting (XSS), where malicious scripts injected by the attacker are stored on the server and later executed in the context of users' browsers. The combination of CSRF and Stored XSS means that an attacker can craft a malicious webpage or link that, when visited by an authenticated user, causes the victim's browser to perform unauthorized actions and execute attacker-controlled scripts. These scripts can steal session cookies, manipulate user data, or perform actions with the victim's privileges. The vulnerability affects the GoogleDrive folder list plugin, a tool used to display Google Drive folders within web applications, which is popular among websites integrating Google Drive content. No CVSS score has been assigned yet, and no public exploits have been reported. The vulnerability was published on October 20, 2024, and was reserved on October 14, 2024, by Patchstack. The lack of a patch link suggests that a fix may not yet be available, increasing the urgency for mitigation. Exploitation requires the victim to be authenticated and to interact with a malicious site, but the impact on confidentiality, integrity, and availability can be severe due to the Stored XSS component.

Potential Impact

The impact of CVE-2024-49335 is significant for organizations using the affected GoogleDrive folder list plugin. Successful exploitation can lead to unauthorized actions performed on behalf of authenticated users, including data manipulation or leakage. The Stored XSS aspect allows attackers to execute persistent malicious scripts, potentially leading to session hijacking, credential theft, or further compromise of user accounts. This can undermine user trust, lead to data breaches, and facilitate lateral movement within an organization's network. The vulnerability could also be leveraged to spread malware or conduct phishing attacks by injecting malicious content into trusted web pages. Since the plugin is used to integrate Google Drive content, sensitive business or personal data exposed through these folders could be at risk. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability's nature makes it a high-risk target for attackers once exploit code becomes available. Organizations with high-value data or large user bases are particularly at risk, as the exploitation could affect multiple users simultaneously.

Mitigation Recommendations

To mitigate CVE-2024-49335, organizations should first check if an official patch or update is available from the plugin vendor and apply it immediately. If no patch is available, consider disabling or removing the GoogleDrive folder list plugin until a fix is released. Implementing anti-CSRF tokens in all state-changing requests can prevent unauthorized request forgery. Web application firewalls (WAFs) can be configured to detect and block suspicious CSRF and XSS attack patterns targeting the plugin endpoints. Conduct a thorough review of input validation and output encoding mechanisms within the plugin to prevent Stored XSS. Educate users about the risks of clicking on suspicious links and visiting untrusted websites, as user interaction is required for exploitation. Regularly audit and monitor web application logs for unusual activities that may indicate exploitation attempts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Finally, maintain a robust incident response plan to quickly address any signs of compromise related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-10-14T10:40:38.485Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd74d2e6bfc5ba1df01183

Added to database: 4/1/2026, 7:41:06 PM

Last enriched: 4/2/2026, 7:05:50 AM

Last updated: 4/6/2026, 9:20:48 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses