Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51791: CWE-434 Unrestricted Upload of File with Dangerous Type in Made I.T. Forms

0
Critical
VulnerabilityCVE-2024-51791cvecve-2024-51791cwe-434
Published: Mon Nov 11 2024 (11/11/2024, 05:54:39 UTC)
Source: CVE Database V5
Vendor/Project: Made I.T.
Product: Forms

Description

Unrestricted Upload of File with Dangerous Type vulnerability in Made I.T. Forms allows Upload a Web Shell to a Web Server.This issue affects Forms: from n/a through 2.8.0.

AI-Powered Analysis

AILast updated: 01/23/2026, 15:35:16 UTC

Technical Analysis

CVE-2024-51791 is a critical security vulnerability identified in the Made I.T. Forms product, affecting versions up to 2.8.0. The vulnerability is classified under CWE-434, which involves unrestricted upload of files with dangerous types. This flaw allows attackers to upload arbitrary files, including web shells, directly to the web server hosting the application. Because the upload mechanism lacks proper validation and restriction on file types, malicious actors can bypass security controls and place executable code on the server. The vulnerability has a CVSS 3.1 base score of 10.0, indicating it is exploitable remotely over the network without any authentication or user interaction, and it impacts confidentiality, integrity, and availability at the highest levels. Successful exploitation can lead to full system compromise, enabling attackers to execute arbitrary commands, steal sensitive data, modify or delete information, and disrupt services. While no public exploits have been reported yet, the vulnerability's nature and severity make it a prime target for attackers. The lack of available patches at the time of publication increases the urgency for organizations to implement interim mitigations. The vulnerability affects web-facing applications that use Made I.T. Forms, which are commonly deployed in various industries for data collection and user interaction. The unrestricted file upload issue is a common vector for web shell deployment, often used as a foothold for further lateral movement and persistence within compromised networks.

Potential Impact

For European organizations, the impact of CVE-2024-51791 is severe. Exploitation can lead to complete compromise of affected web servers, resulting in unauthorized access to sensitive personal and corporate data, disruption of critical services, and potential regulatory non-compliance under GDPR due to data breaches. The integrity of data collected via forms can be undermined, affecting business operations and trust. Additionally, attackers could leverage the web shell to pivot within internal networks, escalating attacks to more critical infrastructure. Organizations in sectors such as finance, healthcare, government, and e-commerce are particularly vulnerable due to the sensitive nature of their data and reliance on web applications. The critical severity and ease of exploitation without authentication mean that attackers can rapidly compromise systems, potentially leading to widespread damage and costly incident response efforts. The absence of known exploits in the wild does not reduce the risk, as the vulnerability is straightforward to exploit once discovered by malicious actors.

Mitigation Recommendations

1. Immediate monitoring for unusual file uploads and web shell indicators on servers running Made I.T. Forms is essential. 2. Implement strict server-side validation of uploaded files, including whitelisting allowed file types and verifying file content signatures rather than relying solely on file extensions. 3. Deploy and configure Web Application Firewalls (WAFs) to detect and block attempts to upload or execute web shells and other malicious payloads. 4. Restrict permissions on upload directories to prevent execution of uploaded files, for example by disabling script execution in those directories via web server configuration. 5. Isolate the web application environment using containerization or sandboxing to limit the impact of a potential compromise. 6. Regularly audit and update all components of the web application stack, and apply patches from Made I.T. promptly once released. 7. Employ network segmentation to limit lateral movement if a web shell is deployed. 8. Conduct penetration testing and vulnerability scanning focused on file upload functionalities to identify and remediate weaknesses proactively. 9. Educate development and operations teams about secure file upload practices and the risks associated with CWE-434.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-11-04T09:57:36.650Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697391d84623b1157c4b18c9

Added to database: 1/23/2026, 3:20:56 PM

Last enriched: 1/23/2026, 3:35:16 PM

Last updated: 2/6/2026, 7:38:20 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats