Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-55494: n/a

0
Medium
VulnerabilityCVE-2024-55494cvecve-2024-55494
Published: Thu Jan 09 2025 (01/09/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-55494 is a PHP code injection vulnerability in Opencode Mobile Collect Call version 5. 4. 7 that allows attackers to execute arbitrary web scripts or HTML via the op_func parameter in /occontrolpanel/index. php. This flaw can lead to remote code execution (RCE) and cross-site scripting (XSS) attacks. The vulnerability requires no privileges but does require user interaction, such as clicking a crafted link. It has a CVSS score of 6. 1, indicating medium severity, with a low impact on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild, and no patches have been published yet. Organizations using this specific version of Opencode Mobile Collect Call are at risk, especially those exposing the vulnerable endpoint to untrusted users.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:05:57 UTC

Technical Analysis

CVE-2024-55494 is a PHP code injection vulnerability identified in Opencode Mobile Collect Call version 5.4.7, specifically within the /occontrolpanel/index.php script. The vulnerability arises from improper sanitization of the op_func parameter, which allows an attacker to inject crafted payloads containing arbitrary web scripts or HTML. This injection can lead to remote code execution (RCE), enabling attackers to execute arbitrary commands on the server, and cross-site scripting (XSS), which can be used to hijack user sessions or deliver malicious scripts to users. The vulnerability does not require authentication (PR:N) but does require user interaction (UI:R), such as a victim clicking a malicious link. The attack vector is network-based (AV:N), meaning it can be exploited remotely over the internet. The vulnerability scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. The CVSS v3.1 base score is 6.1, reflecting medium severity, with low confidentiality and integrity impacts and no availability impact. No patches or official fixes have been released at the time of publication, and no known exploits are reported in the wild. The vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation, aka Cross-site Scripting). This flaw poses a significant risk to organizations running this specific version of Opencode Mobile Collect Call, especially if the vulnerable endpoint is exposed to untrusted networks or users.

Potential Impact

The primary impact of CVE-2024-55494 is the potential for attackers to execute arbitrary code on affected servers, which can lead to unauthorized access, data leakage, or further compromise of internal systems. The XSS component can facilitate session hijacking, phishing, or distribution of malware to users interacting with the vulnerable web interface. Although the vulnerability does not directly impact availability, successful exploitation could allow attackers to pivot within the network or escalate privileges. Organizations relying on Opencode Mobile Collect Call for telephony or call management services may face operational disruptions and reputational damage if exploited. The lack of authentication requirement increases the risk of exploitation, especially in environments where the vulnerable endpoint is publicly accessible. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

1. Immediately restrict access to the /occontrolpanel/index.php endpoint, limiting it to trusted internal networks or VPN users only. 2. Implement strict input validation and sanitization on the op_func parameter to reject or neutralize malicious payloads. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable parameter. 4. Monitor web server logs and application logs for unusual or malformed requests to the vulnerable endpoint. 5. If possible, disable or remove unnecessary features or modules related to op_func to reduce the attack surface. 6. Engage with the vendor or community to obtain patches or updates addressing this vulnerability and apply them promptly once available. 7. Educate users about the risks of clicking unknown or suspicious links that could trigger the vulnerability. 8. Conduct regular security assessments and penetration tests focusing on web application inputs and injection flaws.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-06T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bd0b7ef31ef0b55b207

Added to database: 2/25/2026, 9:38:24 PM

Last enriched: 2/26/2026, 2:05:57 AM

Last updated: 2/26/2026, 7:38:56 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats