Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50620: n/a

0
High
VulnerabilityCVE-2024-50620cvecve-2024-50620
Published: Wed Feb 11 2026 (02/11/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Unrestricted Upload of File with Dangerous Type vulnerabilities exist in the rich text editor and document manage components in CIPPlanner CIPAce before 9.17. An authorized user can upload executable files when inserting images in the rich text editor, and upload executable files when uploading files on the document management page. Those executables can be executed if they are not stored in a shared directory or if the storage directory has executed permissions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/19/2026, 14:09:05 UTC

Technical Analysis

CVE-2024-50620 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting CIPPlanner CIPAce versions prior to 9.17. The issue arises in two components: the rich text editor and the document management system. An authorized user can upload executable files disguised as images or documents without proper validation or restriction. These files, if stored in directories with execute permissions or outside shared directories, can be executed by attackers, leading to remote code execution on the server hosting CIPPlanner CIPAce. The vulnerability requires low complexity to exploit, only needing authenticated access but no additional user interaction. The CVSS v3.1 base score is 8.8 (high), reflecting the network attack vector, low attack complexity, required privileges, and the high impact on confidentiality, integrity, and availability. No patches are currently linked, and no known exploits have been reported in the wild, but the risk remains significant due to the potential for full system compromise. This vulnerability underscores the importance of strict file upload validation and secure storage configurations in web applications handling user-generated content.

Potential Impact

The impact of CVE-2024-50620 is substantial for organizations using CIPPlanner CIPAce, as successful exploitation can lead to remote code execution on critical infrastructure. Attackers gaining execution capabilities can compromise sensitive project planning data, alter or delete documents, disrupt service availability, and potentially pivot to other internal systems. This can result in data breaches, operational downtime, and loss of trust. Since the vulnerability requires authenticated access, insider threats or compromised user credentials increase risk. The broad impact on confidentiality, integrity, and availability makes this a critical concern for organizations relying on CIPPlanner CIPAce for project and document management, especially in sectors where planning data is sensitive or mission-critical.

Mitigation Recommendations

To mitigate CVE-2024-50620, organizations should implement the following specific measures: 1) Immediately restrict file upload types in the rich text editor and document management components to allow only safe image and document formats, explicitly blocking executable file extensions and MIME types. 2) Configure storage directories to disallow execution permissions, ensuring uploaded files cannot be run as executables regardless of type. 3) Apply strict server-side validation and sanitization of all uploaded files, including content inspection beyond file extensions. 4) Enforce the principle of least privilege for users authorized to upload files, limiting access to only those who require it. 5) Monitor file upload logs for suspicious activity and unusual file types. 6) Stay alert for official patches or updates from CIPPlanner CIPAce and apply them promptly once released. 7) Consider implementing application-layer firewalls or intrusion detection systems to detect and block malicious upload attempts. These targeted actions go beyond generic advice and address the root causes and exploitation vectors of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698ce7144b57a58fa1c6a88d

Added to database: 2/11/2026, 8:31:16 PM

Last enriched: 2/19/2026, 2:09:05 PM

Last updated: 3/29/2026, 1:45:39 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses