Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-55078: n/a

0
Critical
VulnerabilityCVE-2024-55078cvecve-2024-55078
Published: Fri Jan 03 2025 (01/03/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An arbitrary file upload vulnerability in the component /adminUser/updateImg of WukongCRM-11.0-JAVA v11.3.3 allows attackers to execute arbitrary code via uploading a crafted file.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 02:01:19 UTC

Technical Analysis

CVE-2024-55078 is an arbitrary file upload vulnerability identified in the /adminUser/updateImg endpoint of WukongCRM-11.0-JAVA version 11.3.3. This vulnerability allows remote attackers to upload maliciously crafted files without authentication or user interaction. The root cause is insufficient validation and sanitization of files uploaded through this administrative component, which is intended for updating user images. By exploiting this flaw, attackers can upload executable code or web shells, leading to remote code execution (RCE) on the underlying server. This compromises the confidentiality, integrity, and availability of the CRM system and potentially the broader network environment. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). The CVSS v3.1 base score is 9.8, reflecting its critical severity, with attack vector as network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No patches or known exploits have been reported at the time of publication, but the high severity demands immediate attention. WukongCRM is a customer relationship management platform used in various sectors, making this vulnerability a significant risk for organizations relying on it for business operations.

Potential Impact

The exploitation of CVE-2024-55078 can have devastating impacts on organizations worldwide. Successful attacks enable remote code execution, allowing attackers to gain full control over the affected CRM server. This can lead to data breaches exposing sensitive customer and business information, manipulation or deletion of critical data, and disruption of CRM services impacting business continuity. Attackers could use the compromised system as a foothold to pivot into internal networks, escalating privileges and deploying further malware or ransomware. The lack of authentication and user interaction requirements significantly lowers the barrier to exploitation, increasing the likelihood of attacks. Organizations in sectors such as finance, retail, healthcare, and government that rely on WukongCRM for customer data management are at heightened risk. The vulnerability also poses reputational damage and potential regulatory penalties due to data loss or exposure.

Mitigation Recommendations

To mitigate CVE-2024-55078, organizations should immediately implement the following measures: 1) Apply any available official patches or updates from WukongCRM vendors as soon as they are released. 2) If patches are not yet available, restrict access to the /adminUser/updateImg endpoint using network-level controls such as firewalls or VPNs to limit exposure. 3) Implement strict server-side validation of uploaded files, enforcing allowed file types, size limits, and scanning for malicious content. 4) Employ web application firewalls (WAFs) with rules designed to detect and block arbitrary file upload attempts targeting this endpoint. 5) Monitor server logs and network traffic for unusual upload activity or execution of unexpected files. 6) Conduct regular security assessments and penetration tests focusing on file upload functionalities. 7) Educate administrators and developers about secure file handling practices to prevent similar vulnerabilities. 8) Consider isolating the CRM application in a segmented network zone to limit lateral movement if compromised.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-06T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bccb7ef31ef0b55b000

Added to database: 2/25/2026, 9:38:20 PM

Last enriched: 2/26/2026, 2:01:19 AM

Last updated: 4/12/2026, 6:14:31 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses