Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-55452: n/a

0
Medium
VulnerabilityCVE-2024-55452cvecve-2024-55452
Published: Mon Dec 16 2024 (12/16/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A URL redirection vulnerability exists in UJCMS 9.6.3 due to improper validation of URLs in the upload and rendering of new block / carousel items. This vulnerability allows authenticated attackers to redirect unprivileged users to an arbitrary, attacker-controlled webpage. When an authenticated user clicks on the malicious block item, they are redirected to the arbitrary untrusted domains, where sensitive tokens, such as JSON Web Tokens, can be stolen via a crafted webpage.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 23:51:00 UTC

Technical Analysis

CVE-2024-55452 is a medium severity URL redirection vulnerability identified in UJCMS version 9.6.3. The root cause is insufficient validation of URLs during the upload and rendering process of new block or carousel items within the CMS. This flaw allows an authenticated attacker with privileges to create or modify these UI components to embed malicious URLs that redirect unprivileged users to arbitrary, attacker-controlled domains. The attack vector requires the attacker to be authenticated (PR:L) and the victim user to interact by clicking the malicious block item (UI:R). The vulnerability impacts confidentiality and integrity by enabling theft of sensitive tokens such as JSON Web Tokens via crafted external webpages. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) indicates network attack vector, low attack complexity, privileges required, user interaction needed, scope changed, and partial confidentiality and integrity impact without availability impact. No patches or known exploits are currently reported. This vulnerability falls under CWE-601 (URL Redirection to Untrusted Site).

Potential Impact

The primary impact of CVE-2024-55452 is the potential compromise of user session tokens and other sensitive information through redirection to malicious sites. This can lead to unauthorized access to user accounts if tokens like JSON Web Tokens are stolen and reused by attackers. The vulnerability undermines user trust and can facilitate further attacks such as phishing or session hijacking. Since exploitation requires authentication and user interaction, the risk is somewhat limited to environments where attackers have some level of access and users may be tricked into clicking malicious UI elements. However, in organizations using UJCMS 9.6.3 for internal or external web content management, this vulnerability could be leveraged to escalate attacks or breach confidentiality. The lack of availability impact means service disruption is unlikely, but data confidentiality and integrity are at risk.

Mitigation Recommendations

To mitigate CVE-2024-55452, organizations should implement strict validation and sanitization of URLs uploaded or embedded in block and carousel items within UJCMS. Restrict the ability to create or modify these UI components to highly trusted and authenticated users only. Employ Content Security Policy (CSP) headers to limit the domains to which users can be redirected or from which scripts can be loaded. Monitor and audit changes to block and carousel items for suspicious URLs. Educate users to be cautious when clicking on newly added or unfamiliar UI elements. If possible, disable or limit the use of blocks/carousels that allow URL embedding until a patch is available. Regularly check for updates from UJCMS vendors and apply security patches promptly once released. Consider implementing multi-factor authentication to reduce the risk of attacker authentication.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-06T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bceb7ef31ef0b55b16b

Added to database: 2/25/2026, 9:38:22 PM

Last enriched: 2/27/2026, 11:51:00 PM

Last updated: 4/12/2026, 3:42:24 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses