CVE-2024-54792: n/a
A Cross-Site Request Forgery (CSRF) vulnerability has been found in SpagoBI v3.5.1 in the user administration panel. An authenticated user can lead another user into executing unwanted actions inside the application they are logged in, like adding, editing or deleting users.
AI Analysis
Technical Summary
CVE-2024-54792 is a Cross-Site Request Forgery (CSRF) vulnerability identified in SpagoBI version 3.5.1, an open-source business intelligence suite widely used for data analytics and reporting. The vulnerability resides in the user administration panel, allowing an authenticated attacker to coerce another authenticated user into executing unwanted administrative actions such as adding, editing, or deleting user accounts. This attack exploits the lack of proper CSRF tokens or validation mechanisms in the user management interface. The attacker must first authenticate to the application and then trick the victim into visiting a crafted malicious webpage or link that issues unauthorized requests on their behalf. The CVSS 3.1 score of 6.1 reflects that the attack vector is network-based with low attack complexity, no privileges required, but requires user interaction. The scope is changed because the attack affects other users' accounts, impacting confidentiality and integrity by potentially altering user roles or access rights. There is no impact on availability. No patches or official fixes have been released at the time of publication, and no known exploits are reported in the wild. The vulnerability is classified under CWE-352, which covers CSRF weaknesses. Organizations using SpagoBI 3.5.1 should prioritize mitigating this vulnerability to prevent unauthorized privilege escalation or user management manipulation.
Potential Impact
For European organizations, the impact of CVE-2024-54792 can be significant in environments where SpagoBI 3.5.1 is used for critical business intelligence and user management. Unauthorized modification of user accounts can lead to privilege escalation, unauthorized data access, or disruption of user roles, undermining confidentiality and integrity of sensitive business data. This can result in insider threats, data leakage, or compliance violations under GDPR if personal data is exposed or improperly accessed. Although availability is not directly affected, the trustworthiness of the BI platform and its data outputs can be compromised. Organizations in sectors such as finance, healthcare, government, and manufacturing that rely on SpagoBI for decision-making and reporting are particularly vulnerable. The requirement for user interaction and authentication limits the attack surface but does not eliminate risk, especially in environments with many users or where phishing/social engineering is feasible. Without immediate mitigation, attackers could leverage this vulnerability to manipulate user privileges and gain unauthorized access to sensitive analytics data.
Mitigation Recommendations
To mitigate CVE-2024-54792 effectively, European organizations should implement the following specific measures: 1) Apply strict CSRF protections by ensuring that all state-changing requests in the user administration panel require a valid, unpredictable CSRF token that is verified server-side. 2) Restrict user administration privileges to a minimal set of trusted users and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of account compromise. 3) Educate users about the risks of phishing and social engineering attacks that could trick them into clicking malicious links. 4) Monitor and audit user administration activities closely for unusual or unauthorized changes, employing anomaly detection where possible. 5) If possible, isolate the user administration interface behind additional network controls or VPN access to limit exposure. 6) Regularly update and patch SpagoBI once an official fix is released. 7) Consider implementing Content Security Policy (CSP) headers and SameSite cookie attributes to reduce CSRF attack vectors. 8) Conduct penetration testing focused on CSRF and user privilege escalation scenarios to validate defenses.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2024-54792: n/a
Description
A Cross-Site Request Forgery (CSRF) vulnerability has been found in SpagoBI v3.5.1 in the user administration panel. An authenticated user can lead another user into executing unwanted actions inside the application they are logged in, like adding, editing or deleting users.
AI-Powered Analysis
Technical Analysis
CVE-2024-54792 is a Cross-Site Request Forgery (CSRF) vulnerability identified in SpagoBI version 3.5.1, an open-source business intelligence suite widely used for data analytics and reporting. The vulnerability resides in the user administration panel, allowing an authenticated attacker to coerce another authenticated user into executing unwanted administrative actions such as adding, editing, or deleting user accounts. This attack exploits the lack of proper CSRF tokens or validation mechanisms in the user management interface. The attacker must first authenticate to the application and then trick the victim into visiting a crafted malicious webpage or link that issues unauthorized requests on their behalf. The CVSS 3.1 score of 6.1 reflects that the attack vector is network-based with low attack complexity, no privileges required, but requires user interaction. The scope is changed because the attack affects other users' accounts, impacting confidentiality and integrity by potentially altering user roles or access rights. There is no impact on availability. No patches or official fixes have been released at the time of publication, and no known exploits are reported in the wild. The vulnerability is classified under CWE-352, which covers CSRF weaknesses. Organizations using SpagoBI 3.5.1 should prioritize mitigating this vulnerability to prevent unauthorized privilege escalation or user management manipulation.
Potential Impact
For European organizations, the impact of CVE-2024-54792 can be significant in environments where SpagoBI 3.5.1 is used for critical business intelligence and user management. Unauthorized modification of user accounts can lead to privilege escalation, unauthorized data access, or disruption of user roles, undermining confidentiality and integrity of sensitive business data. This can result in insider threats, data leakage, or compliance violations under GDPR if personal data is exposed or improperly accessed. Although availability is not directly affected, the trustworthiness of the BI platform and its data outputs can be compromised. Organizations in sectors such as finance, healthcare, government, and manufacturing that rely on SpagoBI for decision-making and reporting are particularly vulnerable. The requirement for user interaction and authentication limits the attack surface but does not eliminate risk, especially in environments with many users or where phishing/social engineering is feasible. Without immediate mitigation, attackers could leverage this vulnerability to manipulate user privileges and gain unauthorized access to sensitive analytics data.
Mitigation Recommendations
To mitigate CVE-2024-54792 effectively, European organizations should implement the following specific measures: 1) Apply strict CSRF protections by ensuring that all state-changing requests in the user administration panel require a valid, unpredictable CSRF token that is verified server-side. 2) Restrict user administration privileges to a minimal set of trusted users and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of account compromise. 3) Educate users about the risks of phishing and social engineering attacks that could trick them into clicking malicious links. 4) Monitor and audit user administration activities closely for unusual or unauthorized changes, employing anomaly detection where possible. 5) If possible, isolate the user administration interface behind additional network controls or VPN access to limit exposure. 6) Regularly update and patch SpagoBI once an official fix is released. 7) Consider implementing Content Security Policy (CSP) headers and SameSite cookie attributes to reduce CSRF attack vectors. 8) Conduct penetration testing focused on CSRF and user privilege escalation scenarios to validate defenses.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-12-06T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f2616f9c34d0947f2ce85d
Added to database: 10/17/2025, 3:31:59 PM
Last enriched: 10/17/2025, 3:47:16 PM
Last updated: 10/20/2025, 12:46:40 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11947: Heap-based Buffer Overflow in bftpd
LowCVE-2025-11946: Cross Site Scripting in LogicalDOC Community Edition
MediumCVE-2025-11945: Cross Site Scripting in toeverything AFFiNE
MediumCVE-2025-11944: SQL Injection in givanz Vvveb
MediumCVE-2025-11943: Use of Default Credentials in 70mai X200
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.